Related references
Note: Only part of the references are listed.When Intrusion Detection Meets Blockchain Technology: A Review
Weizhi Meng et al.
IEEE ACCESS (2018)
Secure Authentication-Management human-centric Scheme for trusting personal resource information on mobile cloud computing with blockchain
Hyun-Woo Kim et al.
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES (2018)
Transaction processing in consistency-aware user's applications deployed on NoSQL databases
Maria Teresa Gonzalez-Aparicio et al.
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES (2017)
Issues in Supply Chain Management: Progress and potential
Douglas M. Lambert et al.
INDUSTRIAL MARKETING MANAGEMENT (2017)
Featuring the e-service quality of online website from a varied perspective
Huan-Ming Chuang et al.
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES (2016)
Bitcoin: Benefit or Curse?
George F. Hurlburt et al.
IT PROFESSIONAL (2014)
Networks for the commercialization of innovations: A review of how divergent network actors contribute
Leena Aarikka-Stenroos et al.
INDUSTRIAL MARKETING MANAGEMENT (2014)
Business to business market segmentation
PV Freytag et al.
INDUSTRIAL MARKETING MANAGEMENT (2001)
Issues in supply chain management
DM Lambert et al.
INDUSTRIAL MARKETING MANAGEMENT (2000)