Login / Signup
A cross-chain identity authentication scheme based on DID.
Yirui Bai
Zixuan Liu
Xuefeng Liu
Xiang Lu
Hong Lei
Published in:
Blockchain (2023)
Keyphrases
</>
authentication scheme
smart card
secret key
user authentication
image encryption
public key
security flaws
image authentication
authentication protocol
real time
response time
low cost
anomaly detection
lightweight
security analysis