Furthermore, the authentication strategy based on smart contracts is combined with Mobile Edge Computing (MEC) to realize access control of users …
http://dlvr.it/TJ70DX

Written in
by
Furthermore, the authentication strategy based on smart contracts is combined with Mobile Edge Computing (MEC) to realize access control of users …
http://dlvr.it/TJ70DX
Tags
Leave a comment