BaaSid
Search...
Ctrl + K
“Authorization based on Blockchain”
2. Introduction
Previous
Key point & Technology of Authentication / 2FA & MFA
Next
2.1. Limitations of and problems with blockchain
Last updated
2 years ago
2.1. Limitations of and problems with blockchain
2.2. Borrowing the DB of BaaS based participants
2.3. Split & Distribute Data
2.4. Verification that is user-centered based on the Public or Private Network
2.5 Proof of integrity for Split & Distribute data