[HTML][HTML] Privacy preservation in permissionless blockchain: A survey
Permissionless blockchain, as a kind of distributed ledger, has gained considerable
attention because of its openness, transparency, decentralization, and immutability …
attention because of its openness, transparency, decentralization, and immutability …
A Survey of Self‐Sovereign Identity Ecosystem
Self‐sovereign identity is the next evolution of identity management models. This survey
takes a journey through the origin of identity, defining digital identity and progressive …
takes a journey through the origin of identity, defining digital identity and progressive …
A decentralized token economy: How blockchain and cryptocurrency can revolutionize business
JY Lee - Business Horizons, 2019 - Elsevier
As the underlying technology of bitcoin, blockchain is expected to create a new economic
system by revolutionizing the way we communicate over the internet. Blockchain seeks to …
system by revolutionizing the way we communicate over the internet. Blockchain seeks to …
A blockchain connected gateway for BLE-based devices in the internet of things
Recently, the popularity of the Internet of Things (IoT) has led to a rapid development and
significant advancement of ubiquitous applications seamlessly integrated within our daily …
significant advancement of ubiquitous applications seamlessly integrated within our daily …
Blockchain-based identity management: A survey from the enterprise and ecosystem perspective
M Kuperberg - IEEE Transactions on Engineering Management, 2019 - ieeexplore.ieee.org
Identity management is a core building block for the majority of software solutions and
landscapes. Competing with existing identity-managing solutions, blockchain-based …
landscapes. Competing with existing identity-managing solutions, blockchain-based …
A taxonomy study on securing Blockchain-based Industrial applications: An overview, application perspectives, requirements, attacks, countermeasures, and open …
Blockchain technology has taken on a leading position in today's industrial applications by
providing salient features and showing significant performance since its beginning …
providing salient features and showing significant performance since its beginning …
When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies
We show how third-party web trackers can deanonymize users of cryptocurrencies. We
present two distinct but complementary attacks. On most shopping websites, third party …
present two distinct but complementary attacks. On most shopping websites, third party …
Enabling attribute revocation for fine-grained access control in blockchain-IoT systems
The attribute-based encryption (ABE) has drawn a lot of attention for fine-grained access
control in blockchains, especially in blockchain-enabled tampering-resistant Internet-of …
control in blockchains, especially in blockchain-enabled tampering-resistant Internet-of …
A user-centric system for verified identities on the bitcoin blockchain
We present an identity management scheme built into the Bitcoin blockchain, allowing for
identities that are as indelible as the blockchain itself. Moreover, we take advantage of …
identities that are as indelible as the blockchain itself. Moreover, we take advantage of …
On the vital aspects and characteristics of cryptocurrency—A survey
Cryptocurrencies acquire user confidence by making the whole creation and transaction
history transparent to the public. In exchange, the transaction history accurately captures the …
history transparent to the public. In exchange, the transaction history accurately captures the …