Author : Mrs. Divyaprabha K N 1
Date of Publication :30th November 2017
Abstract: The management of upstream and downstream value-added flows of materials, final goods, and related information among the companies, distributors, resellers, and final customers can be termed as the main objective of Supply Chain Management. But, at times due to base on virtual data, there occur chances of the failure of the algorithm used to devise the flow plan due to the variations, in the information shared among the people in the supply chain. The data shared between manufacturers, suppliers and customers are affected.
Reference :
-
- Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, https://bitcoin.org/bitcoin.pdf [Accessed March 2017]
- R. L. Rivest, L. Adleman, and M. L. Dertouzos, On data banks and privacy homomorphisms, Foundations of Secure Computation Academia Press, pages 169–179, 1978.
- T. ElGamal, A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inf. Theory 31(4), 469–472 (1985)
- R. Cramer, V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, in Proceedings of Advances in Cryptology, CRYPTO’98, 1998, pp. 13–25
- M. Abdalla, M. Bellare, P. Rogaway, DHAES: an encryption scheme based on the Diffie–Hellman problem. Submission to IEEE P1363a, 1998. http: // www. di.ens.fr /~mabdalla /papers /dhes. pdf