Figure2

Cloud-edge-end based key management for decentralized applications

Figure 2. The initial splitting protocol. The secure channels can be established via public-key encryption or key agreement protocol.

Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/