Fig. 9From: User authentication and access control to blockchain-based forensic log dataComputational time to generate secrets for corporate user, edge server and main serverBack to article page