2019 2nd International Conference on Engineering Technology and Its Applications (IICETA) 2019
DOI: 10.1109/iiceta47481.2019.9012996
|View full text |Cite
|
Sign up to set email alerts
|

Preservation Authentication and Authorization on Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…The total heat power W/m² The received total heat power (flux) for each experimental EDM machining subgroup parametric was analyzed. The experimentally obtained results were modeled by using the three full factorial level response surface methodology (RSM), the analysis of variance (ANOVA), and the statistical design expert system 10.0 software [38], to investigate the significant contribution of the parameters on the responses [39]. By using the graphite and copper tools electrodes, the analysis results for the modeled heat flux (total) that generated by the EDM experiments for all machining experimental sub-groups are demonstrated in Figs.…”
Section: Materials Science and Modern Manufacturingmentioning
confidence: 99%
“…The total heat power W/m² The received total heat power (flux) for each experimental EDM machining subgroup parametric was analyzed. The experimentally obtained results were modeled by using the three full factorial level response surface methodology (RSM), the analysis of variance (ANOVA), and the statistical design expert system 10.0 software [38], to investigate the significant contribution of the parameters on the responses [39]. By using the graphite and copper tools electrodes, the analysis results for the modeled heat flux (total) that generated by the EDM experiments for all machining experimental sub-groups are demonstrated in Figs.…”
Section: Materials Science and Modern Manufacturingmentioning
confidence: 99%
“…Recently, some researchers have introduced blockchain technology into identity authentication [25][26][27]. In [15], the authors proposed a blockchain-based identity management and authentication scheme for mobile networks, where users' identifying information is controlled by the users themselves.…”
Section: Introductionmentioning
confidence: 99%