Research Article
User Sensitive Information Protection Scheme Based on Blockchain Technology
Figure 2
Average computing delay required by the requesting user and collaboration user in the blockchain update.
(a) Average computing delay of requesting user |
(b) Average computing delay of cooperative user |