Research on the risk of block chain technology in Internet finance supported by wireless network
暂无分享,去创建一个
Bo Zhou | Yu Chen | Yayun Zhang | Bo Zhou | Yayun Zhang | Yu Chen
[1] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..
[2] P. Brockhoff,et al. Tests in Linear Mixed Effects Models , 2015 .
[3] Aimin Deng,et al. Managing Online Supply Chain finance Credit Risk ofand#8216;and#8216;Asymmetric Informationand#8217;and#8217; , 2017 .
[4] Youdong Wen,et al. Analysis of R & D Capability of China’s Blockchain Technologies , 2018 .
[5] M. Iansiti,et al. The Truth about Blockchain , 2017 .
[6] Marc Pilkington,et al. Blockchain Technology: Principles and Applications , 2015 .
[7] Atalay Mert Ileri,et al. Realizing the potential of blockchain technologies in genomics , 2018, Genome research.
[8] Xin Xu,et al. Multimodal Representation Learning for Recommendation in Internet of Things , 2019, IEEE Internet of Things Journal.
[9] Aimin Deng,et al. Managing Online Supply Chain finance Credit Risk of “ Asymmetric Information ” , 2017 .
[10] Markus Kraft,et al. Blockchain technology in the chemical industry: Machine-to-machine electricity market , 2017 .
[11] C. Cardone-Riportella,et al. Factors influencing bank risk in Europe: Evidence from the financial crisis , 2015 .
[12] С. В. Иванов,et al. Анализ результатов лечения больных хроническим панкреатитом , 2016 .
[13] Zhixiong Li,et al. A novel sparse representation model for pedestrian abnormal trajectory understanding , 2019, Expert Syst. Appl..
[14] Per B. Brockhoff,et al. lmerTest Package: Tests in Linear Mixed Effects Models , 2017 .
[15] R. Monfared,et al. Blockchain ready manufacturing supply chain using distributed ledger , 2016 .
[16] Xu Wei,et al. Implementation of Personal Information Security Protection Technology Based on Block Chain , 2018 .
[17] Hamid Gharavi,et al. Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree 4-Way Handshaking , 2014, IEEE Transactions on Smart Grid.
[18] Ekram Hossain,et al. Discovering Mobile Applications in Cellular Device-to-Device Communications: Hash Function and Bloom Filter-Based Approach , 2016, IEEE Transactions on Mobile Computing.
[19] Tugrul U. Daim,et al. Understanding the disruptive business model innovation of E-business microcredit: a comparative case study in China , 2018, Technol. Anal. Strateg. Manag..
[20] Weili Wu,et al. Speech corpora subset selection based on time-continuous utterances features , 2018, Journal of Combinatorial Optimization.
[21] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[22] Carlo Kleber da Silva Rodrigues,et al. Simply Dividing a Bitcoin Network Node may Reduce Transaction Verification Time , 2015 .
[23] Hanna Halaburda,et al. Beyond Bitcoin , 2022 .