Author of the publication

Designing a Secure Blockchain-Based Supply Chain Management Framework.

, , , , and . J. Comput. Inf. Syst., 63 (3): 592-607 (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A study on Chinese consumers' concern about books on online bookstores., , and . ICUIMC, page 61. ACM, (2013)Set-based approach in mining sequential patterns., , , and . ISCIS, page 218-223. IEEE, (2009)The Adoption of Mobile Games in China: An Empirical Study., , and . ICISO, volume 426 of IFIP Advances in Information and Communication Technology, page 368-377. Springer, (2014)A Repository Architecture for Business Process Characterizing Models., and . PoEM, volume 68 of Lecture Notes in Business Information Processing, page 162-176. Springer, (2010)Managing the Complexity of Emergent Processes., and . ICEIS (3), page 319-325. (2003)Lr-Stream: Using latency and resource aware scheduling to improve latency and throughput for streaming applications., , , , , and . Future Gener. Comput. Syst., (2021)A novel zero watermark optimization algorithm based on Gabor transform and discrete cosine transform., , , , and . Concurr. Comput. Pract. Exp., (2022)Shortest Path Discovery in Consideration of Obstacle in Mobile Social Network Environments., , , and . CollaborateCom, volume 252 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 637-646. Springer, (2017)Immune Genetic Algorithm for Weapon-Target Assignment Problem., , , and . IITA, page 145-148. IEEE Computer Society, (2007)Checking an Authentication of Person Depends on RFID with Thermal Image., , , and . SpaCCS, volume 11342 of Lecture Notes in Computer Science, page 371-380. Springer, (2018)