Research Article
User Sensitive Information Protection Scheme Based on Blockchain Technology
Figure 1
The average computation delay and communication cost of constructing an anonymous region.
(a) Average computing delay of requesting user and cooperating user |
(b) Average communication cost requesting user and cooperating user |