Author:
Arora Dev,Gautam Siddharth,Sachdeva Prachi,Sharma Sushil,Sharma Vaishali
Reference24 articles.
1. Shen, X., Yu, Q., Liu, X.: Review of blockchain technology. J. Netw. Inf. Secur. 2(11) (2016)
2. Yan, Z., Guohua, G., Di, D., et al. Research on security in blockchain key technologies. Inf. Secur. Res. 2(12), 1090-1097 (2016)
3. Cai, W., Yu, L., Wang, R., et al. Research on development method of application system based on block chain. J. Softw. 28(6), 1474–1487 (2017)
4. Saini, H., Bhushan, B., Arora, A., Kaur, A.: Security vulnerabilities in information communication technology: blockchain to the rescue (a survey on blockchain technology). In: 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT) (2019). https://doi.org/10.1109/icicict46008.2019.8993229
5. Varshney, T., Sharma, N., Kaushik, I., Bhushan, B.: Authentication and encryption based security services in blockchain technology. In: 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) (2019). https://doi.org/10.1109/icccis48478.2019.8974500
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Exoplanet Hunting Using Machine Learning;Emerging Technologies in Data Mining and Information Security;2022-09-29
2. IoT in Medical Science;Emerging Technologies in Data Mining and Information Security;2022-09-29
3. Emerging Trends in Multimedia;Emerging Technologies in Data Mining and Information Security;2022-09-29