Login / Signup
An Approach of Secure Two-Way-Pegged Multi-sidechain.
Jinnan Guo
Keke Gai
Liehuang Zhu
Zijian Zhang
Published in:
ICA3PP (2) (2019)
Keyphrases
</>
factor authentication
database
neural network
real time
data sets
decision trees
similarity measure
key exchange protocol