Fig. 19From: User authentication and access control to blockchain-based forensic log dataA chain of three blocksBack to article page