Sign in
A Novel Blockchain Identity Authentication Scheme Implemented in Fog Computing.
Huijuan Wang
Yong Jiang
Published in:
Wirel. Commun. Mob. Comput. (2020)
Keyphrases
</>
authentication scheme
user authentication
image encryption
smart card
secret key
public key
security analysis
response time
access control
distributed environment
image authentication
security flaws