Abstract: Blockchain based credential revocation strategies presently require excessive system computation and excessive system storage and generate substantial cryptographic evidence during ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results