Return to Article Details Secure Data Sharing in Decentralized Networks: Encryption Techniques, Access Control Mechanisms, and Data Integrity Verification Download Download PDF