2022
DOI: 10.36647/ttidmkd/02.03
|View full text |Cite
|
Sign up to set email alerts
|

Untitled

Abstract: Verification for access is used in software to secure information of the user. There are some kinds of verification process, however, as per the secondary information; major users prefer the biometric verification process. On the other hand, block chain based data storage is used in businesses, banking sectors, and other sectors.In this case, this process helps to store confidential information with proper security. This research is focused on the implementation process of block chain based data storage and ve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 13 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?