Login / Signup
Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns.
Alex Norta
Raimundas Matulevicius
Benjamin Leiding
Published in:
Comput. Secur. (2019)
Keyphrases
</>
identity authentication
security risks
network security
lightweight
mobile commerce
data mining techniques
operating system
information security
security analysis