Login / Signup

Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns.

Alex NortaRaimundas MatuleviciusBenjamin Leiding
Published in: Comput. Secur. (2019)
Keyphrases
  • identity authentication
  • security risks
  • network security
  • lightweight
  • mobile commerce
  • data mining techniques
  • operating system
  • information security
  • security analysis