Enhancing jwt authentication and authorization in web applications based on user behavior history

A Bucko, K Vishi, B Krasniqi, B Rexha - Computers, 2023 - mdpi.com
The rapid growth of the web has transformed our daily lives and the need for secure user
authentication and authorization has become a crucial aspect of web-based services. JSON …

A blockchain-based solution for diploma management in universities

M Caramihai, I Severin - Sustainability, 2023 - mdpi.com
Diplomas are of particular importance in society, as they serve as official proof of education.
Therefore, it is not surprising that counterfeits of such documents have become common …

A Survey on Decentralized Identifiers and Verifiable Credentials

C Mazzocca, A Acar, S Uluagac, R Montanari… - arXiv preprint arXiv …, 2024 - arxiv.org
Digital identity has always been considered the keystone for implementing secure and
trustworthy communications among parties. The ever-evolving digital landscape has gone …

Decentralized Authentication Scheme Incorporating Reputation and Attribute Signature for Cross-Web3 Applications

X Song, G Xu, Y Huang, Y Liu - IEEE Internet of Things Journal, 2025 - ieeexplore.ieee.org
Driven by Web 3.0, the number of decentralized applications (DAPPs) continues to increase,
and the need for decentralized authentication across applications becomes more and more …

AI-HybridChain: Picturized Authentication and DRL based Access Control Method with Secure Two Fold Revocation for Ensuring Cloud Computing Security

SC Krishnan - Future Generation Computer Systems, 2024 - Elsevier
The Internet of Things is susceptible to seepage of private information during the data
sharing. To circumvent this problem, access control and secure data sharing have been …

AASSI: A Self-Sovereign Identity Protocol with Anonymity and Accountability

L Gao, J Yu, J Zhang, Y Tang, Q Wen - IEEE Access, 2024 - ieeexplore.ieee.org
The concern and opposition to centralized management of user identities by third-party
authorities have led to the emergence of Self-Sovereign Identity (SSI). With the help of …

[PDF][PDF] Web3. 0 下的区块链相关技术进展

斯雪明, 潘恒, 刘建美, 祝卫华, 姚中原 - 科技导报, 2023 - kjdb.org
摘要区块链是Web3. 0 构建可信互联, 价值互联的关键技术. 作为一种新的去中心化基础设施,
区块链自身技术也在不断发展. 结合Web3. 0 背景, 介绍了区块链的去中心化身份, 智能合约 …

Anonymised Fixed-Ring Identification Using Decentralised Identifiers

S Grierson, D Kasimatis, WJ Buchanan, C Eckl… - arXiv preprint arXiv …, 2024 - arxiv.org
arXiv:2403.05271v1 [cs.CR] 8 Mar 2024 Page 1 arXiv:2403.05271v1 [cs.CR] 8 Mar 2024
Anonymised Fixed-Ring Identification Using Decentralised Identifiers⋆ Sam Grierson1[0000−0002−3625−6337] …

Complete Security Analysis on Event-Based Dynamic Protocol for Constrained IoT Device

RR Pahlevi, H Hasegawa… - … on Information and …, 2024 - ieeexplore.ieee.org
Authentication protocols have become essential for Internet of Things (IoT) devices.
Developing a secure authentication protocol has become more challenging due to the …

DID: RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof

D Kasimatis, S Grierson, WJ Buchanan… - … on Cyber Security …, 2024 - ieeexplore.ieee.org
Decentralised identifiers have become a standardised element of digital identity
architecture, with supra-national organisations such as the European Union adopting them …