Fig. 2From: Secure Authentication-Management human-centric Scheme for trusting personal resource information on mobile cloud computing with blockchainBasic structure (left) and the three steps of MRM (right)Back to article page