Author:
Swarnkar Mayank,Bhadoria Robin Singh,Sharma Neha
Reference36 articles.
1. Acharya, S., Wang, J., Ge, Z., Znati, T. F., & Greenberg, A. (2006). Traffic aware firewall optimization strategies. In Proceedings of the 12th IEEE International Conference on Communications (ICC’06) (pp. 2225–2230).
2. Anjum, A., Sporny, M., & Sill, A. (2017). Blockchain standards for compliance and trust. Cloud Computing, 4, 84–90.
3. Boyen, X., Carr, C., & Haines, T. (2016). Blockchain-free cryptocurrencies: A framework for truly decentralised fast transactions. Cryptology, 1, 1–13.
4. Fischer, M. J., Lynch, N. A., & Paterson, M. S. (1985). Impossibility of distributed consensus with one faulty process. Journal of the ACM, 32, 374–382.
5. Fournaris, A. P., Dimopoulos, C., Moschos, A., & Koufopavlou, O. (2019). Design and leakage assessment of side channel attack resistant binary edwards elliptic curve digital signature algorithm Architectures. Microprocessors and Microsystems, 64, 73–87.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献