共 65 条
[31]
Kelsey T, 2014, PERSONALISED HLTH CA, P1
[32]
Khan F, 2020, Informat. Sci. Letters, V8, P67, DOI 10.18576/isl/080204
[34]
An Analysis of Anonymity in Bitcoin Using P2P Network Traffic
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014,
2014, 8437
:469-485
[35]
Kuri S, 2017, 2017 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), P1350
[36]
Latif RMA, 2019, 2019 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), P264, DOI [10.1109/C-CODE.2019.8681027, 10.1109/c-code.2019.8681027]
[37]
Blockchain based Data Integrity Service Framework for IoT data
[J].
2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017),
2017,
:468-475
[38]
Lopez-Pintado O, 2017, BPM (Demos)
[40]
Malak A, INT J COMPUT SCI NET, V19, P244