Search dblp for Publications

export results for "toc:db/journals/ac/ac111.bht:"

 download as .bib file

@article{DBLP:journals/ac/0034SWL18,
  author       = {Peng Zhang and
                  Douglas C. Schmidt and
                  Jules White and
                  Gunther Lenz},
  title        = {Chapter One - Blockchain Technology Use Cases in Healthcare},
  journal      = {Adv. Comput.},
  volume       = {111},
  pages        = {1--41},
  year         = {2018},
  url          = {https://doi.org/10.1016/bs.adcom.2018.03.006},
  doi          = {10.1016/BS.ADCOM.2018.03.006},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/0034SWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/AxonGC18,
  author       = {Louise Axon and
                  Michael Goldsmith and
                  Sadie Creese},
  title        = {Chapter Eight - Privacy Requirements in Cybersecurity Applications
                  of Blockchain},
  journal      = {Adv. Comput.},
  volume       = {111},
  pages        = {229--278},
  year         = {2018},
  url          = {https://doi.org/10.1016/bs.adcom.2018.03.004},
  doi          = {10.1016/BS.ADCOM.2018.03.004},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/AxonGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/Banerjee18,
  author       = {Arnab Banerjee},
  title        = {Chapter Three - Blockchain Technology: Supply Chain Insights from
                  {ERP}},
  journal      = {Adv. Comput.},
  volume       = {111},
  pages        = {69--98},
  year         = {2018},
  url          = {https://doi.org/10.1016/bs.adcom.2018.03.007},
  doi          = {10.1016/BS.ADCOM.2018.03.007},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/Banerjee18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/Ikeda18,
  author       = {Kazuki Ikeda},
  title        = {Chapter Seven - Security and Privacy of Blockchain and Quantum Computation},
  journal      = {Adv. Comput.},
  volume       = {111},
  pages        = {199--228},
  year         = {2018},
  url          = {https://doi.org/10.1016/bs.adcom.2018.03.003},
  doi          = {10.1016/BS.ADCOM.2018.03.003},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/Ikeda18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/IkedaH18,
  author       = {Kazuki Ikeda and
                  Md{-}Nafiz Hamid},
  title        = {Chapter Four - Applications of Blockchain in the Financial Sector
                  and a Peer-to-Peer Global Barter Web},
  journal      = {Adv. Comput.},
  volume       = {111},
  pages        = {99--120},
  year         = {2018},
  url          = {https://doi.org/10.1016/bs.adcom.2018.03.008},
  doi          = {10.1016/BS.ADCOM.2018.03.008},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/IkedaH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/Kim18,
  author       = {Shiho Kim},
  title        = {Chapter Two - Blockchain for a Trust Network Among Intelligent Vehicles},
  journal      = {Adv. Comput.},
  volume       = {111},
  pages        = {43--68},
  year         = {2018},
  url          = {https://doi.org/10.1016/bs.adcom.2018.03.010},
  doi          = {10.1016/BS.ADCOM.2018.03.010},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/Kim18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/RajD18a,
  author       = {Pethuru Raj and
                  Ganesh Chandra Deka},
  title        = {Preface},
  journal      = {Adv. Comput.},
  volume       = {111},
  pages        = {ix--x},
  year         = {2018},
  url          = {https://doi.org/10.1016/S0065-2458(18)30058-5},
  doi          = {10.1016/S0065-2458(18)30058-5},
  timestamp    = {Thu, 15 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/RajD18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/RodriguesBS18,
  author       = {Bruno Rodrigues and
                  Thomas Bocek and
                  Burkhard Stiller},
  title        = {Chapter Six - The Use of Blockchains: Application-Driven Analysis
                  of Applicability},
  journal      = {Adv. Comput.},
  volume       = {111},
  pages        = {163--198},
  year         = {2018},
  url          = {https://doi.org/10.1016/bs.adcom.2018.03.011},
  doi          = {10.1016/BS.ADCOM.2018.03.011},
  timestamp    = {Fri, 25 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/RodriguesBS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/Swan18,
  author       = {Melanie Swan},
  title        = {Chapter Five - Blockchain for Business: Next-Generation Enterprise
                  Artificial Intelligence Systems},
  journal      = {Adv. Comput.},
  volume       = {111},
  pages        = {121--162},
  year         = {2018},
  url          = {https://doi.org/10.1016/bs.adcom.2018.03.013},
  doi          = {10.1016/BS.ADCOM.2018.03.013},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/Swan18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics