P Fan, Y Liu, J Zhu, X Fan, L Wen - Int. J. Netw. Secur., 2019 - ijns.jalaxy.com.tw
… The experimental analysis showed that the method could meet the security requirements and
… security authentication system and simulated and analyzed the block chain and security of …