Author of the publication

Designing a Secure Blockchain-Based Supply Chain Management Framework.

, , , , and . J. Comput. Inf. Syst., 63 (3): 592-607 (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fog Computing Based Traffic and Car Parking Intelligent System., , and . ICA3PP (2), volume 11945 of Lecture Notes in Computer Science, page 365-380. Springer, (2019)Managing the Complexity of Emergent Processes., and . ICEIS (3), page 319-325. (2003)A novel zero watermark optimization algorithm based on Gabor transform and discrete cosine transform., , , , and . Concurr. Comput. Pract. Exp., (2022)Lr-Stream: Using latency and resource aware scheduling to improve latency and throughput for streaming applications., , , , , and . Future Gener. Comput. Syst., (2021)Accelerated training of bootstrap aggregation-based deep information extraction systems from cancer pathology reports., , , , , , , , , and 3 other author(s). J. Biomed. Informatics, (2020)EWOD Chip with Micro-Barrier Electrode for Simultaneous Enhanced Mixing during Transportation., , , and . Sensors, 23 (16): 7102 (August 2023)Can re-infiltration process be ignored for flood inundation mapping and prediction during extreme storms? A case study in Texas Gulf Coast region., , , , , , , and . Environ. Model. Softw., (2022)Pedestrian detection algorithm based on improved SSD., , , and . Int. J. Comput. Appl. Technol., 65 (1): 25-35 (2021)VMT: Secure VANETs Message Transmission Scheme with Encryption and Blockchain., , , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 244-257. Springer, (2022)Fisc: A Large-scale Cloud-native-oriented File System., , , , , , , , , and 19 other author(s). FAST, page 231-246. USENIX Association, (2023)