[4]
He W, Tan E L, Lee E W, Li T Y. A solution for integrated track and trace in supply chain based on RFID & GPS. In Proc. IEEE Conf. Emerging Technologies & Factory Automation, September 2009.
[5]
Lindner M, Marquez F G, Chapman C, Clayman S, Henriksson D, Elmroth E. The cloud supply chain: A framework for information, monitoring, accounting and billing. In Proc. the 2nd Int. ICST Conf. Cloud Computing, October 2010.
[7]
Garay J, Kiayias A, Leonardos N. The Bitcoin backbone protocol: Analysis and applications. In Proc. the 34th Annual Int. Conf. the Theory and Applications of Cryptographic Techniques, April 2015, pp.281-310.
[9]
Morabito V. Blockchain practices. In Business Innovation Through Blockchain: The B3 Perspective, Morabito V (ed.), Springer, 2017, pp.145-166.
[10]
Lehmacher W. Global dynamics and key trends. In The Global Supply Chain: How Technology and Circular Thinking Transform Our Future, Lehmacher W (ed.), Springer, 2017, pp.67-112.
[12]
Fox M S, Chionglo J F, Barbuceanu M. The integrated supply chain management system. Technical Report, Department of Industrial Engineering, University of Toronto, 1993.
[14]
Xu X W, Pautasso C, Zhu L M, Gramoli V, Ponomarev A, Tran A B, Chen S P. The blockchain as a software connector. In Proc the 13th Working IEEE/IFIP Conf. Software Architecture, April 2016, pp.182-191.
[19]
Eyal I, Gencer A E, Sirer E G, van Renesse R. Bitcoin-NG: A scalable blockchain protocol. In Proc. the 13th USENIX Conf. Networked Systems Design and Implementation, March 2016, pp.45-59.
[21]
Al-Bassam M. SCPKI: A smart contract-based PKI and identity system. In Proc. the ACM Workshop on Blockchain Cryptocurrencies and Contracts, April 2017, pp.35-40.
[22]
Xu L, Wu X X, Zhang X W. CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. In Proc. the 7th ACM Symp. Information Computer and Communications Security, May 2012, pp.87-88.
[23]
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In Proc. IEEE Symp. Security and Privacy, May 2007, pp.321-334.
[24]
Vukolić M. The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. In Proc. the Int. Workshop on Open Problems in Network Security, October 2015, pp.112-125.
[25]
Vukolić M. Rethinking permissioned blockchains. In Proc. the ACM Workshop on Blockchain Cryptocurrencies and Contracts, April 2017, pp.3-7.
[26]
Guerraoui R, Knežević N, Quéma V, Vukolić M. The next 700 BFT protocols. In Proc. the 5th European Conf. Computer Systems, April 2010, pp.363-376.
[27]
Kotla R, Dahlin M. High throughput Byzantine fault tolerance. In Proc. Int. Conf. Dependable Systems and Networks, July 2004, pp.575-584.
[28]
Croman K, Decker C, Eyal I, Gencer A E, Juels A, Kosba A, Miller A, Saxena P, Shi E, Sirer E G, Song D, Wattenhofer R. On scaling decentralized blockchains. In Proc. Int. Conf. Financial Cryptography and Data Security, February 2016, pp.106-125.
[29]
Cachin C. Architecture of the hyperledger blockchain fabric. In Proc. the Workshop on Distributed Cryptocurrencies and Consensus Ledgers, July 2016.
[30]
Wood T, Singh R, Venkataramani A, Shenoy P, Cecchet E. ZZ and the art of practical BFT execution. In Proc. the 6th Conf. Computer Systems, April 2011, pp.123-138.
[31]
Korpela K, Hallikas J, Dahlberg T. Digital supply chain transformation toward blockchain integration. In Proc. the 50th Hawaii Int. Conf. System Sciences, Jan. 2017, pp.4182-4191.
[32]
Tian F. An agri-food supply chain traceability system for China based on RFID & blockchain technology. In Proc. the 13th Int. Conf. Service Systems and Service Management, June 2016, pp.1-6.
[34]
Milutinovic M, He W, Wu H, Kanwal M. Proof of luck: An efficient blockchain consensus protocol. In Proc. the 1st Workshop on System Software for Trusted Execution, Dec. 2016, Article No. 2.