References
[1]. ACM Digital Library. (n.d.). Retrieved from https://dl.acm.org/action/doSearch?AllField=blockchain+attacks&expand=all&ConceptID=118230
[2]. Barratt, M. (2004). Understanding the meaning of
collaboration in the supply chain. Supply Chain
Management: An International Journal, 9(1), 30-42.
https://doi.org/10.1108/13598540410517566
[3]. Bayer, D., Haber, S., & Stornetta, W. S. (1993).
Improving the efficiency and reliability of digital timestamping.
In Sequences Ii (pp. 329-334). Springer, New
York. https://doi.org/10.1007/978-1-4613-9323-8_24
[4]. Blogs. (n.d.). 10 Blockchain and New Age Security
Attacks you Should Know. Retrieved from https://blogs.arubanetworks.com/solutions/10-blockchain-and-newage-security-attacks-you-should-know/
[5]. Chaum, D. L. (1982). Computer Systems Established,
Maintained and Trusted by Mutually Suspicious Groups
(Doctoral Dissertation, University of California, Berkeley).
[6]. Cloud Security Alliance. (n.d.). Over 200
Documented Blockchain Attacks, Vulnerabilities and
Weaknesses. Retrieved from https://cloudsecurityalliance.org/blog/2020/10/26/blockchain-attacks-vulnerabilities-and-weaknesses
[7]. Ethereum Whitepaper. (n.d.). A Next-Generation
Smart Contract and Decentralized Application Platform.
Retrieved from https://ethereum.org/en/whitepaper/
[8]. Ethereum. (2017). Ethereum Home stead
Documentation. Retrieved from https://buildmedia.readthedocs.org/media/pdf/ethereum-homestead/latest/ethereum-homestead.pdf
[9]. Fawcett, S. E., Fawcett, A. M., Watson, B. J., &
Magnan, G. M. (2012). Peeking inside the black box:
toward an understanding of supply chain collaboration
dynamics. Journal of Supply Chain Management, 48(1),
44-72. https://doi.org/10.1111/j.1745-493X.2011.03241.x
[10]. Fawcett, S. E., Osterhaus, P., Magnan, G. M., Brau, J.
C., & McCarter, M. W. (2007). Information sharing and
supply chain performance: the role of connectivity and
willingness. Supply Chain Management: An International
Journal, 12(5), 358–368. https://doi.org/10.1108/13598540710776935
[11]. Frankel, R., Goldsby, T. J., & Whipple, J. M. (2002).
Grocery industry collaboration in the wake of ECR. The
International Journal of Logistics Management, 13(1), 57-72. https://doi.org/10.1108/09574090210806360
[12]. Groetsema, A., Groetsema, A., Sahdev, N., Salami,
N., Schwentker, R., & Cioanca, F. (2019). Blockchain for
Business: An Introduction to Hyperledger Technologies.
The Linux Foundation.
[13]. Gurugubilli, S. T., Ratnakanth, B., & Ramana, K. V.
(2019). Secure payment system in supplychain management using blockchain technologies. Journal of
Emerging Technologies and Innovative Research (JETIR),
6(6), 364-372.
[14]. Haber, S., & Stornetta, W. S. (1991). How to timestamp
a digital document. In Conference on the Theory
and Application of Cryptography (pp. 437-455). Springer,
Berlin, Heidelberg. https://doi.org/10.1007/3-540-38424-3_32
[15]. Habib, M. (2011). Supply Chain Management
(SCM): Theory and Evolution, IntechOpen, 1-14.
[16]. Hackius, N., & Petersen, M. (2017). Blockchain in
logistics and supply chain: trick or treat? In Digitalization in
Supply Chain Management and Logistics: Smart and
Digital Solutions for an Industry 4.0 Environment.
Proceedings of the Hamburg International Conference
of Logistics (HICL), Vol. 23 (pp. 3-18), epubli GmbH, Berlin.
https://doi.org/10.15480/882.1444
[17]. Horvath, L. (2001). Collaboration: The key to value
creation in supply chain management. Supply Chain
Management: An International Journal, 6(5), 205-207.
https://doi.org/10.1108/EUM0000000006039
[18]. IBM. (n.d.). What is Blockchain Security? Retrieved
from https://www.ibm.com/in-en/topics/blockchainsecurity
[19]. Kanth, B. R., & Ramana, K. V. (2020). Satchain:
Secured autonomous transactions in supply chain using
block chain. International Journal of Innovative
Technology and Exploring Engineering (IJITEE), 9(6), 1661-1669. https://doi.org/10.35940/ijitee.F4365.049620
[20]. Nakamoto, S. (n.d.). Bitcoin: A Peer-to-Peer
Electronic Cash System. Retrieved from https://bitcoin.org/bitcoin.pdf
[21]. Ratnakanth, B., & Ramana, K. V. (2021). Secure
methods for supplychain management to protect from
attacks in blockchain. International Journal of Science
and Research (IJSR), 10(6), 1240-1249.
[22]. Ratnakanth, B., & VenkataRamana, K. (2020).
Systematic approach to analyze attacks on SCM: Using
blockchain. International Journal of Recent Technology
and Engineering (IJRTE), 9(2), 1086-1093. http://doi.org/10.35940/ijrte.B4091.079220
[23]. Ratnakanth, B., Sahiti, M., & Ramana, K. V. (2020).
Efficient methods to avoid smart contract vulnerabilities
using block chain. International Journal of Science and
Research (IJSR), 9(8), 600-606.
[24]. Sharma, R. (2021). Bit Gold. Retrieved from https://www.investopedia.com/terms/b/bit-gold.asp
[25]. Sheldon, (2021). A Timeline and History of
Blockchain Technology. Retrieved from https://www.techtarget.com/whatis/feature/A-timeline-and-histor y-ofblockchain-technology