2023
DOI: 10.1016/j.cosrev.2023.100590
|View full text |Cite
|
Sign up to set email alerts
|

Distributed ledger technologies for authentication and access control in networking applications: A comprehensive survey

Fariba Ghaffari,
Emmanuel Bertin,
Noel Crespi
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 191 publications
0
1
0
Order By: Relevance
“…This encryption prevents potential interception of sensitive data, such as credit card information and passwords, during transmission [81]- [87]. Authentication is also a crucial aspect provided by HTTPS, ensuring that both the server and the client can verify each other's identities [88], [89]. In today's internet landscape where trust and security are paramount, the authentication function offered by HTTPS is very paramount.…”
Section: Http and Httpsmentioning
confidence: 99%
“…This encryption prevents potential interception of sensitive data, such as credit card information and passwords, during transmission [81]- [87]. Authentication is also a crucial aspect provided by HTTPS, ensuring that both the server and the client can verify each other's identities [88], [89]. In today's internet landscape where trust and security are paramount, the authentication function offered by HTTPS is very paramount.…”
Section: Http and Httpsmentioning
confidence: 99%