60
Views
2
CrossRef citations to date
0
Altmetric
Articles

Utility system for farmers using data analytics and blockchain – KrishiCoin

, &

References

  • Tien Tuan Anh Dinh, Rui Liu, Meihui Zhang, Gang Chen, Beng Chin: Untangling Blockchain: A Data Processing View of Blockchain Systems https://ieeexplore.ieee.org/document/8246573
  • M. Stonebraker, S. Madden, D. J. Abadi, S. Harizopoulos, N. Hachem, P. Helland, “The end of an architectural era (it’s time for a complete rewrite)”, Proc. 33rd Int. Conf. Very Large Data Bases, pp. 1150-1160, 2007.
  • J. C. Corbett, et al., “Spanner: Google’s globally-distributed database”, Proc. 10th USENIX Symp. Operating Syst. Des. Implementation, pp. 261-264, 2012.
  • M. Castro, B. Liskov, “Practical byzantine fault tolerance”, Proc. 3rd USENIX Symp. Operating Syst. Des. Implementation, pp. 173-186, 1999.
  • Q. H. Vu, M. Lupu, B. C. Ooi, Peer-to-Peer Computing Principles and Applications, Berlin, Germany: Springer-Verlag, 2009.
  • F. P. Junqueira, B. C. Reed, M. Serafini, “Zab: High-performance broadcast for primary-backup systems”, Proc. IEEE/IFIP Int. Conf. Dependable Syst. Netw., pp. 245-256, 2011.
  • D. Ongaro, J. K. Ousterhout, “In search of an understandable consensus algorithm”, Proc. USENIX Annu. Tech. Conf., pp. 305-319, 2014. ”Parity: Next generation ethereum browser.”, [online] Available: https://ethcore.io/parity.html.
  • L. Luu, V. Narayanan, C. Zhang, K. Baweija, S. Gilbert, P. Saxena, “A secure sharding protocol for open blockchains”, Proc. ACM SIGSAC Conf. Comput. Commun. Security, pp. 17-30, 2016.
  • T. T. A. Dinh, P. Saxena, E. C. Chang, B. C. Ooi, C. Zhang, “M2R: Enabling stronger privacy in MapReduce computation”, Proc. 24th USENIX Conf. Security Symp., pp. 447-462, 2015.
  • W. Zheng, A. Dave, J. Beekman, R. A. Popa, J. Gonzalez, I. Stoica, “Oqaque: An oblivious and encrypted distributed analytics platform”, Proc. 12th USENIX Conf. Netw. Syst. Des. Implementation, pp. 283-298, 2017.
  • F. Zhang, E. Cecchetti, K. Croman, E. Shi, “Town crier: An authenticated data feed for smart contracts”, Proc. ACM SIGSAC Conf. Comput. Commun. Security, pp. 270-282, 2016.
  • S. Meiklejohn, et al., “A fistful of bitcoins: Characterizing payments among men with no names”, Proc. 9th ACM SIGCOMM Conf. Internet Meas., pp. 127-140, 2013.
  • Haya R Hasan, Khaled Salah: “Blockchaim-Baed Proof of Delivery of Physical Assets with Single and Multiple Transporters. Consumers are Now Doing Most of Their Shopping Online, Jun. 2018, [online] Available: http://fortune.com/2016/06/08/online-shopping-increases/. https://www.amazon.com/gp/help/customer/display.html/ref=hp_ss_qs_v3_rt_ci?ie=UTF8&nodeId=20111735
  • H. R. Hasan, K. Salah, “Blockchain-based solution for proof of delivery of physical assets”, Proc. Int. Conf. Blockchain, pp. 139-152, 2018. Szabo, N. (1997) Formalizing and Securing Relationships on Public Networks. First Monday, 2, No. 9. http://firstmonday.org/ojs/index.php/fm/article/view/548/469/.
  • Buterin, V. (2015) On Public and Private Blockchains. Ethereum Blog, Crypto Renaissance Salon. 7th August 2015.
  • Suman Bhakar & Devershi Pallavi Bhatt (2020) Development of augmented reality application to detect the 3D marker through POSIT algorithm, Journal of Discrete Mathematical Sciences and Cryptography, 23:2, 365-372, DOI: 10.1080/09720529.2020.1721867
  • Devender Kumar, Harsh Kumar Singh & Chhahat Ahlawat (2020) A secure three-factor authentication scheme for wireless sensor networks using ECC, Journal of Discrete Mathematical Sciences and Cryptography, 23:4, 879-900, DOI: 10.1080/09720529.2019.1627072
  • Pooja Dehraj & Arun Sharma (2020) Autonomic computing based trustworthiness attributes weight estimation using Electre-Tri method, Journal of Interdisciplinary Mathematics, 23:1, 21-29, DOI: 10.1080/09720502.2020.1721643

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.