Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] A. Ferrag, . M. Derdour and . M. Mukherjee, “Blockchain technologies for the internet of things: research,” IEEE, 2018. [2] . B. Carminati, . L. Bahri and . E. Ferrari, “Decentralized privacy preserving services for online social networks,” Online Soc Netw media, 2018. [3] Z. Zheng , . S. Xie and H.-N. Dai, “Blockchain challenges and opportunities: a survey,” Int. J. Web and Grid Services, vol. 14, 2018. [4] Unocoin, “What Factors Are Influencing Blockchain Technology,” 2018. [5] X. Li, P. Jiang, Q. Wen and X. Luo, “A survey on the security of blockchain systems,” Future Generation Computer Systems, 2017. [6] Z. Zheng, S. Xie and H. Wang, “Blockchain challenges and opportunities: A Survey,” Internat. J. Web Grid Serv., 2016. [7] M. Ghosh, M. Richardson and B. Ford, “A TORPATH TO TORCOIN, PROOF-OF-BANDWIDTH ALTCOINS FOR COMPENSATING RELAYS”. [8] Intel, “Proof of elapsed time (poet),” 2017. [9] P. Technologies, “Proof of Authority Chains,” 2017. [10] A. Gervais, G. Karame and V. Glykantzis, “On the security and performance of proof of work blockchains,,” SIGSAC Conference on Computer and Communications Security, 2016. [11] W. J. Gordo and C. Catalini, “Blockchain Technology for Healthcare: Facilitating the Transition to Patient-Driven Interoperability,” Computational and Structural Biotechnology Journal, 2018. [12] M. Hölbl, A. Kamišali´ and L. N. Zlatolas, “A Systematic Review of the Use of Blockchain,” Symmetry 2018, 2018. [13] P. Novotny, D. N. Dillenberger and R. Vaculin, “Permissioned Blockchain Technologies for”. [14] K. Yilmaz, “Comparison of Permissioned Blockchains,” Coinmonks. [15] H. Mayer, “ECDSA Security in Bitcoin and Ethereum: a Research,” 2016. [16] S. Alliance, “Know your ransomware: Ctb-locker,” 2017. [17] N. Christin, “Traveling the silk road: A measurement analysis of a large anonymous,” The 22nd International Conference on World wide, 2017. [18] A. Miller, M. Möser, K. Lee and A. Narayanan, “An empirical analysis of linkability in the monero blockchain,” ArXiv preprint, 2017. [19] E. community, “Official Go implementation of the Ethereum protocol,” 2017. [20] B. Bodó, J. P. Quintais and D. Gervais, “Blockchain and smart contracts: the missing link in copyright licensing,” International Journal of Law and Information Technology, vol. 26, no. 4, 2018. [21] Z. Zheng, S. Xie and H.-N. Dai, “An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends,” IEEE International Congress on Big Data, 2017. [22] M. Bartoletti, T. Cimoli and L. Pompianu, “Blockchain for social good: a quantitative analysis,” Goodtechs, 2018. [23] A. Kosba, C. Papamanthou and . A. Miller, “Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts,” IEEE Symposium on Security and Privacy, 2016.
![]() | V6I401.pdf |