Application Level Authentication for Ethereum Private Blockchain Atomic Crosschain Transactions.
Peter RobinsonPublished in: CoRR (2019)
Keyphrases
- application level
- operating system
- quality of service
- network management
- virtual machine
- network services
- overlay network
- database
- bottle neck
- privacy preserving
- business transactions
- security mechanisms
- security analysis
- biometric authentication
- databases
- user authentication
- concurrency control
- distributed systems
- cooperative
- artificial intelligence
- credit card
- authentication protocol
- information retrieval
- data mining