[HTML][HTML] Privacy preservation in permissionless blockchain: A survey

L Peng, W Feng, Z Yan, Y Li, X Zhou… - Digital Communications …, 2021 - Elsevier
Permissionless blockchain, as a kind of distributed ledger, has gained considerable
attention because of its openness, transparency, decentralization, and immutability …

A Survey of Self‐Sovereign Identity Ecosystem

R Soltani, UT Nguyen, A An - Security and Communication …, 2021 - Wiley Online Library
Self‐sovereign identity is the next evolution of identity management models. This survey
takes a journey through the origin of identity, defining digital identity and progressive …

A decentralized token economy: How blockchain and cryptocurrency can revolutionize business

JY Lee - Business Horizons, 2019 - Elsevier
As the underlying technology of bitcoin, blockchain is expected to create a new economic
system by revolutionizing the way we communicate over the internet. Blockchain seeks to …

A blockchain connected gateway for BLE-based devices in the internet of things

SC Cha, JF Chen, C Su, KH Yeh - ieee access, 2018 - ieeexplore.ieee.org
Recently, the popularity of the Internet of Things (IoT) has led to a rapid development and
significant advancement of ubiquitous applications seamlessly integrated within our daily …

Blockchain-based identity management: A survey from the enterprise and ecosystem perspective

M Kuperberg - IEEE Transactions on Engineering Management, 2019 - ieeexplore.ieee.org
Identity management is a core building block for the majority of software solutions and
landscapes. Competing with existing identity-managing solutions, blockchain-based …

A taxonomy study on securing Blockchain-based Industrial applications: An overview, application perspectives, requirements, attacks, countermeasures, and open …

K Hameed, M Barika, S Garg, MB Amin… - Journal of Industrial …, 2022 - Elsevier
Blockchain technology has taken on a leading position in today's industrial applications by
providing salient features and showing significant performance since its beginning …

When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies

S Goldfeder, H Kalodner, D Reisman… - arXiv preprint arXiv …, 2017 - arxiv.org
We show how third-party web trackers can deanonymize users of cryptocurrencies. We
present two distinct but complementary attacks. On most shopping websites, third party …

Enabling attribute revocation for fine-grained access control in blockchain-IoT systems

G Yu, X Zha, X Wang, W Ni, K Yu, P Yu… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
The attribute-based encryption (ABE) has drawn a lot of attention for fine-grained access
control in blockchains, especially in blockchain-enabled tampering-resistant Internet-of …

A user-centric system for verified identities on the bitcoin blockchain

D Augot, H Chabanne, T Chenevier, W George… - … Workshops, DPM 2017 …, 2017 - Springer
We present an identity management scheme built into the Bitcoin blockchain, allowing for
identities that are as indelible as the blockchain itself. Moreover, we take advantage of …

On the vital aspects and characteristics of cryptocurrency—A survey

AFMS Shah, MA Karabulut, AFMS Akhter… - Ieee …, 2023 - ieeexplore.ieee.org
Cryptocurrencies acquire user confidence by making the whole creation and transaction
history transparent to the public. In exchange, the transaction history accurately captures the …