Fig. 15From: User authentication and access control to blockchain-based forensic log dataSimulation of protocol in Fig. 11 using AVISPA—when public-private keys not usedBack to article page