References
                                               [1]. ACM Digital Library. (n.d.). Retrieved from https://dl.acm.org/action/doSearch?AllField=blockchain+attacks&expand=all&ConceptID=118230
 [2]. Barratt, M. (2004). Understanding the meaning of
collaboration in the supply chain. Supply Chain
Management: An International Journal, 9(1), 30-42.
https://doi.org/10.1108/13598540410517566
 [3]. Bayer, D., Haber, S., & Stornetta, W. S. (1993).
Improving the efficiency and reliability of digital timestamping.
In Sequences Ii (pp. 329-334). Springer, New
York. https://doi.org/10.1007/978-1-4613-9323-8_24
 [4]. Blogs. (n.d.). 10 Blockchain and New Age Security
Attacks you Should Know. Retrieved from https://blogs.arubanetworks.com/solutions/10-blockchain-and-newage-security-attacks-you-should-know/
 [5]. Chaum, D. L. (1982). Computer Systems Established,
Maintained and Trusted by Mutually Suspicious Groups
(Doctoral Dissertation, University of California, Berkeley).
 [6]. Cloud Security Alliance. (n.d.). Over 200
Documented Blockchain Attacks, Vulnerabilities and
Weaknesses. Retrieved from https://cloudsecurityalliance.org/blog/2020/10/26/blockchain-attacks-vulnerabilities-and-weaknesses
 [7]. Ethereum Whitepaper. (n.d.). A Next-Generation
Smart Contract and Decentralized Application Platform.
Retrieved from https://ethereum.org/en/whitepaper/
 [8]. Ethereum. (2017). Ethereum Home stead
Documentation. Retrieved from https://buildmedia.readthedocs.org/media/pdf/ethereum-homestead/latest/ethereum-homestead.pdf
 [9]. Fawcett, S. E., Fawcett, A. M., Watson, B. J., &
Magnan, G. M. (2012). Peeking inside the black box:
toward an understanding of supply chain collaboration
dynamics. Journal of Supply Chain Management, 48(1),
44-72. https://doi.org/10.1111/j.1745-493X.2011.03241.x
 [10]. Fawcett, S. E., Osterhaus, P., Magnan, G. M., Brau, J.
C., & McCarter, M. W. (2007). Information sharing and
supply chain performance: the role of connectivity and
willingness. Supply Chain Management: An International
Journal, 12(5), 358–368. https://doi.org/10.1108/13598540710776935
 [11]. Frankel, R., Goldsby, T. J., & Whipple, J. M. (2002).
Grocery industry collaboration in the wake of ECR. The
International Journal of Logistics Management, 13(1), 57-72. https://doi.org/10.1108/09574090210806360
 [12]. Groetsema, A., Groetsema, A., Sahdev, N., Salami,
N., Schwentker, R., & Cioanca, F. (2019). Blockchain for
Business: An Introduction to Hyperledger Technologies.
The Linux Foundation.
 [13]. Gurugubilli, S. T., Ratnakanth, B., & Ramana, K. V.
(2019). Secure payment system in supplychain management using blockchain technologies. Journal of
Emerging Technologies and Innovative Research (JETIR),
6(6), 364-372.
 [14]. Haber, S., & Stornetta, W. S. (1991). How to timestamp
a digital document. In Conference on the Theory
and Application of Cryptography (pp. 437-455). Springer,
Berlin, Heidelberg. https://doi.org/10.1007/3-540-38424-3_32
 [15]. Habib, M. (2011). Supply Chain Management
(SCM): Theory and Evolution, IntechOpen, 1-14.
 [16]. Hackius, N., & Petersen, M. (2017). Blockchain in
logistics and supply chain: trick or treat? In Digitalization in
Supply Chain Management and Logistics: Smart and
Digital Solutions for an Industry 4.0 Environment.
Proceedings of the Hamburg International Conference
of Logistics (HICL), Vol. 23 (pp. 3-18), epubli GmbH, Berlin.
https://doi.org/10.15480/882.1444
 [17]. Horvath, L. (2001). Collaboration: The key to value
creation in supply chain management. Supply Chain
Management: An International Journal, 6(5), 205-207.
https://doi.org/10.1108/EUM0000000006039
 [18]. IBM. (n.d.). What is Blockchain Security? Retrieved
from https://www.ibm.com/in-en/topics/blockchainsecurity
 [19]. Kanth, B. R., & Ramana, K. V. (2020). Satchain:
Secured autonomous transactions in supply chain using
block chain. International Journal of Innovative
Technology and Exploring Engineering (IJITEE), 9(6), 1661-1669. https://doi.org/10.35940/ijitee.F4365.049620
 [20]. Nakamoto, S. (n.d.). Bitcoin: A Peer-to-Peer
Electronic Cash System. Retrieved from https://bitcoin.org/bitcoin.pdf
 [21]. Ratnakanth, B., & Ramana, K. V. (2021). Secure
methods for supplychain management to protect from
attacks in blockchain. International Journal of Science
and Research (IJSR), 10(6), 1240-1249.
 [22]. Ratnakanth, B., & VenkataRamana, K. (2020).
Systematic approach to analyze attacks on SCM: Using
blockchain. International Journal of Recent Technology
and Engineering (IJRTE), 9(2), 1086-1093. http://doi.org/10.35940/ijrte.B4091.079220
 [23]. Ratnakanth, B., Sahiti, M., & Ramana, K. V. (2020).
Efficient methods to avoid smart contract vulnerabilities
using block chain. International Journal of Science and
Research (IJSR), 9(8), 600-606.
 [24]. Sharma, R. (2021). Bit Gold. Retrieved from https://www.investopedia.com/terms/b/bit-gold.asp
 [25]. Sheldon, (2021). A Timeline and History of
Blockchain Technology. Retrieved from https://www.techtarget.com/whatis/feature/A-timeline-and-histor y-ofblockchain-technology