Research Article
IOV Privacy Protection System Based on Double-Layered Chains
Algorithm 5
Information dissemination.
INPUT: | OUTPUT: | 1: function | 2: | 3: | 4: | 5: | 6:if is valid then | 7: | 8: | 9: | 10:else | 11:return | 12:end if | 13:if is valid then | 14: | 15:else | 16:return | 17:end if | 18: end function |
|