Overview of Internet of Medical Things Security Based on Blockchain Access Control (pages 1-20)
Yikai Liu (College of Science, North China University of Science and Technology, Tangshan, China & Hebei Key Laboratory of Data Science and Application, Tangshan, China & The Key Laboratory of Engineering Computing in Tangshan City, Tangshan, China), Fenglan Ju (Financial Department, North China University of Science and Technology, Tangshan, China), Qunwei Zhang (College of Science, North China University of Science and Technology, Tangshan, China & Hebei Key Laboratory of Data Science and Application, Tangshan, China & The Key Laboratory of Engineering Computing in Tangshan City, Tangshan, China), Meng Zhang (College of Science, North China University of Science and Technology, Tangshan, China & Hebei Key Laboratory of Data Science and Application, Tangshan, China & The Key Laboratory of Engineering Computing in Tangshan City, Tangshan, China), Zezhong Ma (College of Science, North China University of Science and Technology, Tangshan, China & Hebei Key Laboratory of Data Science and Application, Tangshan, China & The Key Laboratory of Engineering Computing in Tangshan City, Tangshan, China), Mingduo Li (State Key Laboratory of Process Automation in Mining and Metallurgy, Beijing, China & Beijing Key Laboratory of Process Automation in Mining and Metallurgy, Beijing, China), Aimin Yang (College of Science, North China University of Science and Technology, Tangshan, China & Hebei Key Laboratory of Data Science and Application, Tangshan, China & The Key Laboratory of Engineering Computing in Tangshan City, Tangshan, China), Fengchun Liu (College of Science, North China University of Science and Technology, Tangshan, China & Hebei Key Laboratory of Data Science and Application, Tangshan, China & The Key Laboratory of Engineering Computing in Tangshan City, Tangshan, China)