2018
DOI: 10.3103/s0146411618080400
|View full text |Cite
|
Sign up to set email alerts
|

Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…The user’s login detail saved in a cloud database which is authenticated in peer-to-peer architecture on the cloud database at various levels. Blockchain finds many applications in various areas [30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46].…”
Section: Proposed Blockchain Authentication Mechanism (Bam)mentioning
confidence: 99%
“…The user’s login detail saved in a cloud database which is authenticated in peer-to-peer architecture on the cloud database at various levels. Blockchain finds many applications in various areas [30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46].…”
Section: Proposed Blockchain Authentication Mechanism (Bam)mentioning
confidence: 99%