Return to Article Details A critical review of blockchain-based authentication techniques Download Download PDF