1. Preference-based resource allocation in cloud computing systems;Kumar N;3rd International conference on rec. trends in comp,2015
2. Enhanced Elliptic Curve Cryptographic Technique for protecting sensitive attributes in cloud storage. IEEE Int. Conf. Computar. Intel. and Computar;Sumathi M;Res,2018
3. Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System. Int. J;Sumathi M;Cloud App Comp,2020
4. Bitcoin: A peer-to-peer electronic cash system;Nakamoto S.,2008
5. The Bitcoin backbone protocol: Analysis and Applications. In Proc. Annu. Int. Conf, Theory Appl. Crypt;Garay J;Techn,2014