Author of the publication

Storage Protocol for Securing Blockchain Transparency.

, , , , and . COMPSAC (2), page 577-581. IEEE Computer Society, (2018)978-1-5386-2667-2.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interruptibility Estimation Based on Head Motion and PC Operation., , , and . Int. J. Hum. Comput. Interaction, 31 (3): 167-179 (2015)Fabchain: Managing Audit-able 3D Print Job over Blockchain., , , , , and . ICBC, page 1-3. IEEE, (2022)Ward method of hierarchical clustering for non-Euclidean similarity measures., , , and . SoCPaR, page 60-63. IEEE, (2015)Hierarchical clustering algorithms with automatic estimation of the number of clusters., , , and . IFSA-SCIS, page 1-5. IEEE, (2017)Blockchain Storage Load Balancing Among DHT Clustered Nodes.. CoRR, (2019)Mitigating Bitcoin Node Storage Size By DHT., , and . AINTEC, page 17-23. ACM, (2018)Mitigation of Seller and Buyer's Dilemma with Transaction History and Escrow., , , and . AINTEC, page 1-9. ACM, (2023)Simple Bitplane Coding and Its Application to Multi-Functional Image Compression., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (5): 938-951 (2012)Storage Protocol for Securing Blockchain Transparency., , , , and . COMPSAC (2), page 577-581. IEEE Computer Society, (2018)978-1-5386-2667-2.Attack Incentive and Security of Exchanging Tokens on Proof-of-Work Blockchain., , , and . AINTEC, page 32-37. ACM, (2018)