Sign in

A Novel Blockchain Identity Authentication Scheme Implemented in Fog Computing.

Huijuan WangYong Jiang
Published in: Wirel. Commun. Mob. Comput. (2020)
Keyphrases
  • authentication scheme
  • user authentication
  • image encryption
  • smart card
  • secret key
  • public key
  • security analysis
  • response time
  • access control
  • distributed environment
  • image authentication
  • security flaws