Subject
Artificial Intelligence,Computer Science Applications,General Engineering
Reference33 articles.
1. A survey on DDoS attack and defense strategies: From traditional schemes to current techniques;Aamir;Interdisciplinary Information Sciences,2013
2. Dcentroid: Location privacy-preserving scheme in spatial crowdsourcing;Alharthi,2019
3. Secure multiparty computations on bitcoin;Andrychowicz,2014
4. Bao, F., Deng, R. H., Ding, X., & Yang, Y. (2008). Private query on encrypted data in multi-user settings. In Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), Vol. 4991 LNCS (May 2014), (pp. 71–85).
5. Bentov, I., & Kumaresan, R. (2014). How to use Bitcoin to design fair protocols. In Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), Vol.8617 LNCS (PART 2), (pp. 421–439).
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献