Fig. 17From: User authentication and access control to blockchain-based forensic log dataAsymmetric key generation for all usersBack to article page