Research Article

Blockchain Technology: Is It a Good Candidate for Securing IoT Sensitive Medical Data?

Algorithm 3

1: function  CLIENT
2:
3: while    do
4:
5: if    then
6:
7: ;
8: end if
9: end while
10: end function