REFERENCES
Castro MA, Ahumada Olivares MC, Putman CM, Cebral
JR. Intracranial Aneurysm Wall Motion and Wall Shear
Stress from 4D Computerized Tomographic
Angiography Images. Proc Int Soc Opt Phot (SPIE).
2013;8672.
Cerqueira MD, Weissman NJ, Dilsizian V, Jacobs AK,
Kaul S, Laskey WK, et al. Standardized Myocardial
Segmentation and Nomenclature for Tomographic
Imaging of the Heart: A Statement for Healthcare
Professionals from the Cardiac Imaging Committee of
the Council on Clinical Cardiology of the American
Heart Association. Circulation. 2002;105(4):539 – 542.
D. Chkliaev, J. Hooman and P. van der Stok, “Mechanical
verification of transaction processing systems,” in Proc.
ICFEM 2000. Third IEEE International Conference on
Formal Engineering Methods, 2000, pp. 89-97.
D. Puthal, N. Malik, S. P. Mohanty, E. Kougianos and G.
Das, “Everything You Wanted to Know About the
Blockchain: Its Promise, Components, Processes, and
Problems,” IEEE Consumer Electronics Magazine, vol.
7, no. 4, pp. 6-14, 2018.
D. Liu and J. Lee, “CNN based Malicious Website
Detection by Invalidating Multiple Web Spams,” IEEE
Access, vol. 8, no. 1, pp. 97258-97266, 2020.
F. Casino and C. Patsakis, “An Efficient Blockchain-Based
Privacy-Preserving Collaborative Filtering
Architecture,” IEEE Transactions on Engineering
Management, vol. 67, no. 4, pp. 1501-1513, Nov. 2020.
Hennemuth A, Friman O, Schumann C, Bock J, Drexl J,
Huellebrand M, et al. Fast Interactive Exploration of 4D
MRI Flow Data. Proc Int Soc Opt Phot (SPIE).
2011;7964.
K¨ohler B, Gasteiger R, Preim U, Theisel H, Gutberlet M,
Preim B. Semi-Automatic Vortex Extraction in 4D PC-
MRI Cardiac Blood Flow Data Using Line Predicates.
IEEE Trans Vis Comput Graph. 2013;19(12):2773 –
2782.
L. Peng, W. Feng, and Z. Yan. (2020). Privacy preservation
in permissionless blockchain: A survey. Digital
Communications and Networks. [Online]. Available:
https://doi.org/10.1016/j.dcan.2020.05.008.
Markle M, Frydrychowicz A, Kozerke S, Hope MD,
Wieben O. 4D Flow MRI. J Magn Reson Imag.
2012;36(5):1015 – 1036.
McLoughlin T, Laramee RS, Peikert R, Post FH, Chen M.
Over Two Decades of Integration-Based, Geometric
Flow. Comp Graph Forum. 2010;29(6):1807 – 1829
N. Kakade and U. Patel, “Secure Secret Sharing Using
Homomorphic Encryption,” in Proc. 2020 11th
International Conference on Computing,
Communication and Networking Technologies, 2020,
pp. 1-7.
P. J. Taylor, T. Dargahi, A. Dehghantanha, R. M. Parizi,
and K. K. R. Choo, “A systematicliterature review of
blockchain cyber security,” Digital Communications
and Networks, vol. 6, no.2, pp. 147-156, 2020.P
r¨om L, Sj¨oqvist L, Wranne B. Temporally Resolved 3D
Phase-Contrast Imaging. J Magn Reson Imag.
1996;36(5):800 – 803.
S. Kaushik, and S. Puri, “Online transaction processing
using enhanced sensitive data transfer security model,”
in Proc. 2012 Students Conference on Engineering and
Systems, 2012, pp. 1-4.
S. Sundari and M. Ananthi, “Secure multi-party
computation in differential private data with Data
Integrity Protection,” in Proc. 2015 International
Conference on Computing and Communications
Technologies, 2015, pp. 180-184.
S. Jiao, T. Lei, Y. Gao, Z. Xie and X. Yuan, “Known-
Plaintext Attack and Ciphertext-Only Attack for
Encrypted Single-Pixel Imaging,” IEEE Access, vol. 7,
no.2, pp. 119557-119565, 2019.
S. Zhang, and J H. Lee. “Mitigations on Sybil-based
Double-spend Attacks in Bitcoin,” IEEE Consumer
Electronics Magazine, vol.7, no. 2, pp. 1-1, 2020.
W. Martin, V. Friedhelm, and K. Axel, “Tracing
manufacturing processes using blockchain-based token
compositions,” Digital Communications and Networks,
vol. 6, no 2, pp.167-176, 2019.
W. Zheng, Z. Zheng, X. Chen, K. Dai, P. Li and R. Chen,
“NutBaaS: A Blockchain-as-a-Service Platform,” IEEE
Access, vol. 7, pp. 134422-134433, 2019.