2. Introduction
2.1. Limitations of and problems with blockchain2.2. Borrowing the DB of BaaS based participants2.3. Split & Distribute Data2.4. Verification that is user-centered based on the Public or Private Network2.5 Proof of integrity for Split & Distribute data
PreviousKey point & Technology of Authentication / 2FA & MFANext2.1. Limitations of and problems with blockchain
Last updated