Research Article

IOV Privacy Protection System Based on Double-Layered Chains

Algorithm 5

Information dissemination.
INPUT:  
OUTPUT:  
1: function
2:
3:
4:
5:
6:if   is valid  then
7:
8:
9:
10:else
11:return  
12:end if
13:if   is valid  then
14:
15:else
16:return  
17:end if
18: end function