EFTA01612898.pdf PDF
…space that trusted, auditable computing is possible authentication software based on the OAuth protocol [191, in using a decentralized network of peers accompanied by a public which they serve as centralized trusted authorities. ledger. In this paper. we describe a…