Sign in

Data concealing of supply chain transactions using the Distributed Trust Backbone.

Potchara PruksasriJan van den BergWout HofmanYao-Hua Tan
Published in: ICITST (2014)
Keyphrases
  • supply chain
  • dynamic programming
  • wireless sensor networks
  • data mining techniques
  • service level
  • inventory control