![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/ac/ac111.bht:"
@article{DBLP:journals/ac/0034SWL18, author = {Peng Zhang and Douglas C. Schmidt and Jules White and Gunther Lenz}, title = {Chapter One - Blockchain Technology Use Cases in Healthcare}, journal = {Adv. Comput.}, volume = {111}, pages = {1--41}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.006}, doi = {10.1016/BS.ADCOM.2018.03.006}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/0034SWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AxonGC18, author = {Louise Axon and Michael Goldsmith and Sadie Creese}, title = {Chapter Eight - Privacy Requirements in Cybersecurity Applications of Blockchain}, journal = {Adv. Comput.}, volume = {111}, pages = {229--278}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.004}, doi = {10.1016/BS.ADCOM.2018.03.004}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AxonGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Banerjee18, author = {Arnab Banerjee}, title = {Chapter Three - Blockchain Technology: Supply Chain Insights from {ERP}}, journal = {Adv. Comput.}, volume = {111}, pages = {69--98}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.007}, doi = {10.1016/BS.ADCOM.2018.03.007}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Banerjee18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Ikeda18, author = {Kazuki Ikeda}, title = {Chapter Seven - Security and Privacy of Blockchain and Quantum Computation}, journal = {Adv. Comput.}, volume = {111}, pages = {199--228}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.003}, doi = {10.1016/BS.ADCOM.2018.03.003}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Ikeda18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/IkedaH18, author = {Kazuki Ikeda and Md{-}Nafiz Hamid}, title = {Chapter Four - Applications of Blockchain in the Financial Sector and a Peer-to-Peer Global Barter Web}, journal = {Adv. Comput.}, volume = {111}, pages = {99--120}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.008}, doi = {10.1016/BS.ADCOM.2018.03.008}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/IkedaH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Kim18, author = {Shiho Kim}, title = {Chapter Two - Blockchain for a Trust Network Among Intelligent Vehicles}, journal = {Adv. Comput.}, volume = {111}, pages = {43--68}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.010}, doi = {10.1016/BS.ADCOM.2018.03.010}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Kim18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RajD18a, author = {Pethuru Raj and Ganesh Chandra Deka}, title = {Preface}, journal = {Adv. Comput.}, volume = {111}, pages = {ix--x}, year = {2018}, url = {https://doi.org/10.1016/S0065-2458(18)30058-5}, doi = {10.1016/S0065-2458(18)30058-5}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RajD18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RodriguesBS18, author = {Bruno Rodrigues and Thomas Bocek and Burkhard Stiller}, title = {Chapter Six - The Use of Blockchains: Application-Driven Analysis of Applicability}, journal = {Adv. Comput.}, volume = {111}, pages = {163--198}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.011}, doi = {10.1016/BS.ADCOM.2018.03.011}, timestamp = {Fri, 25 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RodriguesBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Swan18, author = {Melanie Swan}, title = {Chapter Five - Blockchain for Business: Next-Generation Enterprise Artificial Intelligence Systems}, journal = {Adv. Comput.}, volume = {111}, pages = {121--162}, year = {2018}, url = {https://doi.org/10.1016/bs.adcom.2018.03.013}, doi = {10.1016/BS.ADCOM.2018.03.013}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Swan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.