Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions

A. H. Mohsin, A. A. Zaidan, B. B. Zaidan, O. S. Albahri, A. S. Albahri, M. A. Alsalem, K. I. Mohammed. Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions. Computer Standards & Interfaces, 64:41-60, 2019. [doi]

Authors

A. H. Mohsin

This author has not been identified. Look up 'A. H. Mohsin' in Google

A. A. Zaidan

This author has not been identified. Look up 'A. A. Zaidan' in Google

B. B. Zaidan

This author has not been identified. Look up 'B. B. Zaidan' in Google

O. S. Albahri

This author has not been identified. Look up 'O. S. Albahri' in Google

A. S. Albahri

This author has not been identified. Look up 'A. S. Albahri' in Google

M. A. Alsalem

This author has not been identified. Look up 'M. A. Alsalem' in Google

K. I. Mohammed

This author has not been identified. Look up 'K. I. Mohammed' in Google