Figure4

Cloud-edge-end based key management for decentralized applications

Figure 4. The update protocol, assuming $$ sk_1 $$ in the end node is tampered with.

Journal of Surveillance, Security and Safety
ISSN 2694-1015 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/