Information Sharing for Supply Chain Management Based on Block Chain Technology
暂无分享,去创建一个
[1] Jeffrey H. Dyer. Collaborative Advantage: Winning through Extended Enterprise Supplier Networks , 2000 .
[2] Νικόλαος Γ. Θερίος,et al. Organizational learning as a strategic resource in supply chain management , 2006 .
[3] Vitaly Shmatikov,et al. How To Break Anonymity of the Netflix Prize Dataset , 2006, ArXiv.
[4] David L. Deeds,et al. The impact of stocks and flows of organizational knowledge on firm performance: an empirical investigation of the biotechnology industry , 1999 .
[5] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[6] Danny C. K. Ho,et al. Empirical research on supply chain management: A critical review and recommendations , 2002 .
[7] Christopher W. Craighead,et al. Enabling the benefits of Supply Chain Management Systems: an empirical study of Electronic Data Interchange (EDI) in manufacturing , 2006 .
[8] David Mandell Freeman,et al. Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups , 2010, EUROCRYPT.
[9] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[10] A. Gunasekaran,et al. Performance measures and metrics in a supply chain environment , 2001 .
[11] Powell E. Robinson,et al. Flow Coordination and Information Sharing in Supply Chains: Review, Implications, and Directions for Future Research , 2002, Decis. Sci..
[12] Carol Stoak Saunders,et al. Data exchange in interorganizational relationships: review through multiple conceptual lenses , 2005, DATB.
[13] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[14] R. Handfield,et al. The role of trust and relationship structure in improving supply chain responsiveness , 2002 .
[15] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[16] Arun Rai,et al. Firm performance impacts of digitally enabled supply chain integration capabilities , 2006 .
[17] Mihir Bellare,et al. DHAES: An Encryption Scheme Based on the Diffie-Hellman Problem , 1999, IACR Cryptol. ePrint Arch..
[18] César A. Hidalgo,et al. Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.
[19] George Q. Huang,et al. The impacts of sharing production information on supply chain dynamics: A review of the literature , 2003 .
[20] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[21] A. Oke,et al. Antecedents of supply chain visibility in retail supply chains: A resource-based theory perspective , 2007 .
[22] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[23] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[24] R. Handfield,et al. Antecedents of leadtime competitiveness in make-to-order manufacturing firms , 1995 .
[25] E. L. Nichols,et al. ORGANIZATIONAL LEARNING AS A STRATEGIC RESOURCE IN SUPPLY MANAGEMENT , 2003 .
[26] R. Cagliano,et al. E‐business strategy , 2003 .
[27] Omar El Sawy,et al. Coordinating for Flexibility in e-Business Supply Chains , 2004, J. Manag. Inf. Syst..