Open Access
Issue
ITM Web Conf.
Volume 56, 2023
First International Conference on Data Science and Advanced Computing (ICDSAC 2023)
Article Number 06002
Number of page(s) 14
Section Networks & Information Security
DOI https://doi.org/10.1051/itmconf/20235606002
Published online 09 August 2023
  1. S. Nakamoto. Bitcoin whitepaper. URL: https://bitcoin.org/bitcoin. (2008). [Google Scholar]
  2. M. M. Queiroz, R. Telles, and S. H. Bonilla, Blockchain and supply chain management integration: a systematic review of the literature. Supply Chain Management: An International Journal (2019). [Google Scholar]
  3. M. H’olbl. M. Kompara, A. Kami’sali’c. and L. Nemec Zlatolas, A systematic review of the use of blockchain in healthcare. Symmetry, 10(10): 470 (2018). [CrossRef] [Google Scholar]
  4. M. Raikwar, S. Mazumdar, S. Ruj, S. Sen Gupta, A. Chattopadhyay, and K. Lam, A blockchain framework for insurance processes. In 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pages 1-4. IEEE, (2018). [Google Scholar]
  5. Kshetri and Voas, 2018 N. Kshetri, J. Voas. Blockchain-enabled e-voting. IEEE Software, 35 (4) (2018), pp. 95-99. [Google Scholar]
  6. V. Buterin et al., A next-generation smart contract and decentralized application platform. White Paper, 3(37):2-11 (2014). [Google Scholar]
  7. Z. Zheng, S. Xie, H. Dai, W. Chen, X. Chen, J. Weng, and M. Imran, An overview on smart contracts: Challenges, advances and platforms. Future Generation Computer Systems, 105:475-491 (2020). [CrossRef] [Google Scholar]
  8. Q. Wang, R. Li, Q. Wang, and S. Chen. Non-fungible token (nft): Overview, evaluation, opportunities and challenges. arXiv preprint arXiv:2105.07447 (2021). [Google Scholar]
  9. J. Benet, IPFS-content addressed versioned P2P file system, (2014), [online] Available: https://arxiv.org/abs/1407.3561. [Google Scholar]
  10. E. GlenWeyl, P. Ohlhaver, and V. Buterin. Decentralized society: Finding web3 ‘s soul. Available at SSRN 4105763 (2022). [Google Scholar]
  11. J. Benet and N. Greco, Filecoin: A decentralized storage network, (2018), [online] Available: https://filecoin.io/filecoin.pdf. [Google Scholar]
  12. U. Feige, A. Fiat, and A. Shamir, Zero-knowledge proofs of identity. Journal of cryptology, 1(2):77-94, (1988). [CrossRef] [MathSciNet] [Google Scholar]
  13. J. Sedlmeir, R. Smethurst, A. Rieger, and G. Fridgen, Digital identities and verifiable credentials. Business & Information Systems Engineering, 63(5):603-613, (2021). [CrossRef] [Google Scholar]
  14. Fe. Hildebrandt, The future of soulbound tokens and their blockchain accounts. In Konferenzband zum Scientific Track der Blockchain Autumn School (2022), number 2, pages 18-24. Hochschule Mittweida, (2022). [Google Scholar]
  15. M. Casonato, Owning your data through self-sovereign identity: agents implementation for verifiable credentials interaction (2021). [Google Scholar]
  16. N. Sun, Y. Zhang, and Y. Liu, A privacy-preserving kyccompliant identity scheme for accounts on all public blockchains. Sustainability, 14(21):14584, (2022). [CrossRef] [Google Scholar]
  17. C. Chen, L. Zhang, Y. Li, T. Liao, S. Zhao, Z. Zheng, H. Huang, and J. Wu, When digital economy meets web 3.0: Applications and challenges. IEEE Open Journal of the Computer Society, (2022). [Google Scholar]
  18. S. Li and Y. Chen, How non-fungible tokens empower business modelinnovation. Business Horizons, (2022). [Google Scholar]
  19. A. Tariq, H. Binte Haq, and S. Taha Ali, Cerberus: A blockchain-based accreditation and degree verification system. IEEE Transactions on Computational Social Systems, (2022). [Google Scholar]
  20. I. Meirobie, A. Puma Irawan, H. Teja Sukmana, D. Putri Lazirkha, and N. Puji Lestari Santoso. Framework authentication e-document using blockchain technology on the government system. International Journal of Artificial Intelligence Research, 6(2), (2022). [CrossRef] [Google Scholar]
  21. K. Dhyani, J. Mishra, S. Paladhi, and I. S. Thaseen, A blockchain-based document verification system for employers. In Proceedings of International Conference on Computational Intelligence and Data Engineering, pages 123-137. Springer, (2022). [CrossRef] [Google Scholar]
  22. R. Mukta, J. Martens, H. Paik, Q. Lu, and S. S. Kanhere, Blockchain-based verifiable credential sharing with selective disclosure. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (Trust- Com), pages 959-966. IEEE, (2020). [Google Scholar]
  23. A. M’uhle, A. Gr’uner. T. Gayvoronskaya, and C. Meinel, A survey on essential components of a self-sovereign identity. Computer Science Review, 30:80-86, (2018). [CrossRef] [Google Scholar]
  24. A. Mi San, N. Chotikakamthorn, and C. Sathitwiriyawong, Blockchain-based learning credential verification system with recipient privacy control. In 2019 IEEE International Conference on Engineering, Technology and Education (TALE), pages 1-5. IEEE, (2019). [Google Scholar]
  25. R. Arenas and P. Fernandez, Credenceledger: a permissioned blockchain for verifiable academic credentials. In 2018 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC), pages 1-6. IEEE, (2018). [Google Scholar]
  26. A. Badr, L. Rafferty, Q. H. Mahmoud, K. Elgazzar, and P.C.K. Hung, A permissioned blockchain-based system for verification of academic records. In 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pages 1-5. IEEE, (2019). [Google Scholar]
  27. C. Cachin et al., Architecture of the hyperledger blockchain fabric. In Workshop on distributed cryptocurrencies and consensus ledgers, volume 310, pages 1-4. Chicago, IL, (2016). [Google Scholar]
  28. K. Singh, O. Dib, C. Huyart, and K. Toumi, A novel credential protocol for protecting personal attributes in blockchain. Computers & Electrical Engineering, 83:106586, (2020). [CrossRef] [Google Scholar]
  29. M. Ramachandran, N. Chowdhury, A. Third, J. Domingue, K. Quick, and M. Bachler, Towards complete decentralised verification of data with confidentiality: different ways to connect solid pods and blockchain. In Companion Proceedings of the Web Conference 2020, pages 645-649, (2020). [CrossRef] [Google Scholar]
  30. A. Sonnino, M. Al-Bassam, S. Bano, S. Meiklejohn, and G. Danezis. Coconut: Threshold issuance selective disclosure credentials with applications to distributed ledgers. arXiv preprint arXiv:1802.07344, (2018). [Google Scholar]
  31. A. Mohammad and S. Vargas, Challenges of using blockchain in the education sector: A literature review. Applied Sciences, 12(13):6380, (2022). [CrossRef] [Google Scholar]
  32. M. Szydlo, Merkle tree traversal in log space and time. In International Conference on the Theory and Applications of Cryptographic Techniques, pages 541-554. Springer, (2004). [Google Scholar]
  33. S. Alam et al., A blockchain-based framework for secure educational credentials. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10):5157-5167, (2021) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.