Enhancing jwt authentication and authorization in web applications based on user behavior history
The rapid growth of the web has transformed our daily lives and the need for secure user
authentication and authorization has become a crucial aspect of web-based services. JSON …
authentication and authorization has become a crucial aspect of web-based services. JSON …
A blockchain-based solution for diploma management in universities
M Caramihai, I Severin - Sustainability, 2023 - mdpi.com
Diplomas are of particular importance in society, as they serve as official proof of education.
Therefore, it is not surprising that counterfeits of such documents have become common …
Therefore, it is not surprising that counterfeits of such documents have become common …
A Survey on Decentralized Identifiers and Verifiable Credentials
Digital identity has always been considered the keystone for implementing secure and
trustworthy communications among parties. The ever-evolving digital landscape has gone …
trustworthy communications among parties. The ever-evolving digital landscape has gone …
Decentralized Authentication Scheme Incorporating Reputation and Attribute Signature for Cross-Web3 Applications
X Song, G Xu, Y Huang, Y Liu - IEEE Internet of Things Journal, 2025 - ieeexplore.ieee.org
Driven by Web 3.0, the number of decentralized applications (DAPPs) continues to increase,
and the need for decentralized authentication across applications becomes more and more …
and the need for decentralized authentication across applications becomes more and more …
AI-HybridChain: Picturized Authentication and DRL based Access Control Method with Secure Two Fold Revocation for Ensuring Cloud Computing Security
SC Krishnan - Future Generation Computer Systems, 2024 - Elsevier
The Internet of Things is susceptible to seepage of private information during the data
sharing. To circumvent this problem, access control and secure data sharing have been …
sharing. To circumvent this problem, access control and secure data sharing have been …
AASSI: A Self-Sovereign Identity Protocol with Anonymity and Accountability
L Gao, J Yu, J Zhang, Y Tang, Q Wen - IEEE Access, 2024 - ieeexplore.ieee.org
The concern and opposition to centralized management of user identities by third-party
authorities have led to the emergence of Self-Sovereign Identity (SSI). With the help of …
authorities have led to the emergence of Self-Sovereign Identity (SSI). With the help of …
[PDF][PDF] Web3. 0 下的区块链相关技术进展
斯雪明, 潘恒, 刘建美, 祝卫华, 姚中原 - 科技导报, 2023 - kjdb.org
摘要区块链是Web3. 0 构建可信互联, 价值互联的关键技术. 作为一种新的去中心化基础设施,
区块链自身技术也在不断发展. 结合Web3. 0 背景, 介绍了区块链的去中心化身份, 智能合约 …
区块链自身技术也在不断发展. 结合Web3. 0 背景, 介绍了区块链的去中心化身份, 智能合约 …
Anonymised Fixed-Ring Identification Using Decentralised Identifiers
S Grierson, D Kasimatis, WJ Buchanan, C Eckl… - arXiv preprint arXiv …, 2024 - arxiv.org
arXiv:2403.05271v1 [cs.CR] 8 Mar 2024 Page 1 arXiv:2403.05271v1 [cs.CR] 8 Mar 2024
Anonymised Fixed-Ring Identification Using Decentralised Identifiers⋆ Sam Grierson1[0000−0002−3625−6337] …
Anonymised Fixed-Ring Identification Using Decentralised Identifiers⋆ Sam Grierson1[0000−0002−3625−6337] …
Complete Security Analysis on Event-Based Dynamic Protocol for Constrained IoT Device
RR Pahlevi, H Hasegawa… - … on Information and …, 2024 - ieeexplore.ieee.org
Authentication protocols have become essential for Internet of Things (IoT) devices.
Developing a secure authentication protocol has become more challenging due to the …
Developing a secure authentication protocol has become more challenging due to the …
DID: RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof
D Kasimatis, S Grierson, WJ Buchanan… - … on Cyber Security …, 2024 - ieeexplore.ieee.org
Decentralised identifiers have become a standardised element of digital identity
architecture, with supra-national organisations such as the European Union adopting them …
architecture, with supra-national organisations such as the European Union adopting them …