Fig. 8From: User authentication and access control to blockchain-based forensic log dataSimulation of protocol in Fig. 4 using AVISPA—when authentication is not maintainedBack to article page