Login / Signup

Combined Application of Hash, Public Key and Blockchain Technology in Electronic Money Transactions.

Qiang LiXiaoqing HuXinqiang Ma
Published in: ICISCAE (ACM) (2021)
Keyphrases
  • public key
  • key technologies
  • secret key
  • encryption scheme
  • security analysis
  • data streams
  • public key cryptography