Self-Sovereign Identity in a Globalized World: Credentials-Based Identity Systems as a Driver for Economic Inclusion
暂无分享,去创建一个
[1] P. Eakin. How our lives become stories : making selves , 2019 .
[2] Mehmet Aydar,et al. Towards a Blockchain based digital identity verification, record attestation and record sharing system , 2019, ArXiv.
[3] Mohamed Dâfir Ech-Cherif El Kettani,et al. Analysis of Identity Management Systems Using Blockchain Technology , 2019, 2019 International Conference on Advanced Communication Technologies and Networking (CommNet).
[4] Alex Pentland,et al. Verifiable Anonymous Identities and Access Control in Permissioned Blockchains , 2019, ArXiv.
[5] Primavera De Filippi,et al. Blockchain and the Law , 2018 .
[6] Christoph Meinel,et al. A Survey on Essential Components of a Self-Sovereign Identity , 2018, Comput. Sci. Rev..
[7] Paco Garcia,et al. Biometrics on the blockchain , 2018 .
[8] A. Wright,et al. Blockchain and the Law: The Rule of Code , 2018 .
[9] Jim Canham. Biometrics: leap of faith or fact of life? , 2018 .
[10] Fabien A. P. Petitcolas,et al. A First Look at Identity Management Schemes on the Blockchain , 2018, IEEE Security & Privacy.
[11] John Callahan,et al. The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity , 2017, 2018 International Joint Conference on Neural Networks (IJCNN).
[12] Jouni Markkula,et al. EU General Data Protection Regulation: Changes and implications for personal data collecting companies , 2017, Comput. Law Secur. Rev..
[13] Pascale Bronder,et al. Blockchain—Powering and Empowering the Poor in Developing Countries , 2018 .
[14] R. Allen,et al. Leapfrogging Banks in Emerging Markets , 2018 .
[15] Andrea Freund,et al. Automated, Decentralized Trust: A Path to Financial Inclusion , 2018 .
[16] Stefan Jähnichen,et al. Self-sovereign Identity - Opportunities and Challenges for the Digital Revolution , 2017, ArXiv.
[17] B. Mcdonald,et al. Designing a Global Digital Currency , 2017, Journal of International Money and Finance.
[18] David Gerard,et al. Attack of the 50 Foot Blockchain: Bitcoin, Blockchain, Ethereum & Smart Contracts , 2017 .
[19] Joshua Knobe,et al. The True Self: A Psychological Concept Distinct From the Self , 2017, Perspectives on psychological science : a journal of the Association for Psychological Science.
[20] Laura Ricci,et al. Blockchain Based Access Control , 2017, DAIS.
[21] Johan A. Pouwelse,et al. Portable Trust: biometric-based authentication and blockchain storage for self-sovereign identity systems , 2017, ArXiv.
[22] Michel Rauchs,et al. 2017 Global Cryptocurrency Benchmarking Study , 2017 .
[23] Quoc Khanh Nguyen,et al. Blockchain - A Financial Technology for Future Sustainable Development , 2016, 2016 3rd International Conference on Green Technology and Sustainable Development (GTSD).
[24] Primavera De Filippi,et al. The Invisible Politics of Bitcoin: Governance Crisis of a Decentralized Infrastructure , 2016 .
[25] Primavera de Filippi,et al. The Interplay between Decentralization and Privacy: The Case of Blockchain Technologies , 2016 .
[26] J. Potts,et al. Economics of Blockchain , 2016 .
[27] Mario Baum,et al. Handbook Of Biometrics , 2016 .
[28] D. Baars. Towards self-sovereign identity using blockchain technology , 2016 .
[29] Primavera De Filippi,et al. Decentralized Blockchain Technology and the Rise of Lex Cryptographia , 2015 .
[30] Primavera de Filippi. Translating Commons-Based Peer Production Values into Metrics: Towards Commons-Based Crypto-Currencies , 2015 .
[31] Kai Rannenberg,et al. Attribute-based Credentials for Trust: Identity in the Information Society , 2014 .
[32] S. Sarkar. The Unique Identity (UID) Project, Biometrics and Re-Imagining Governance in India , 2014 .
[33] Woo Chaw Seng,et al. A review of biometric technology along with trends and prospects , 2014, Pattern Recognit..
[34] Peter H. Gleick,et al. Water, Drought, Climate Change, and Conflict in Syria , 2014 .
[35] Primavera De Filippi,et al. Bitcoin: A Regulatory Nightmare to a Libertarian Dream , 2014 .
[36] Darlington,et al. The Future of Bitcoin: Mapping the Global Adoption of World’s Largest Cryptocurrency Through Benefit Analysis , 2014 .
[37] Marina Blanton,et al. Secure Multiparty Computation , 2011, Encyclopedia of Cryptography and Security.
[38] Patrizio Campisi,et al. Security and Privacy in Biometrics , 2013, Springer London.
[39] J. Christman. Social Practical Identities and the Strength of Obligation , 2013 .
[40] Stark C. Draper,et al. Secure Biometrics: Concepts, Authentication Architectures, and Challenges , 2013, IEEE Signal Processing Magazine.
[41] Eleni Kosta. Consent in European Data Protection Law , 2013, Nijhoff studies in EU law.
[42] Amit Sahai,et al. Secure Multi-Party Computation , 2013 .
[43] Ghassan O. Karame,et al. Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.
[44] Anil K. Jain,et al. Biometric Authentication: System Security and User Privacy , 2012, Computer.
[45] Lee A. Bygrave,et al. The Data Difficulty in Database Protection , 2012 .
[46] Minhaz Fahim Zibran,et al. Biometric Authentication : The Security Issues , 2012 .
[47] M. A. Woolson. Security, Risk and the Biometric State: Governing Borders and Bodies (review) , 2012 .
[48] The Mobile Money Movement: Catalyst to Jump-Start Emerging Markets , 2011, Innovations: Technology, Governance, Globalization.
[49] Rajeev Motwani,et al. Distributing data for secure database services , 2011, PAIS '11.
[50] C. Borio,et al. Global Imbalances and the Financial Crisis: Reassessing the Role of International Finance , 2010 .
[51] Benjamin K. Ngugi,et al. M‐pesa: A Case Study of the Critical Early Adopters’ Role in the Rapid Adoption of Mobile Money Banking in Kenya , 2010, Electron. J. Inf. Syst. Dev. Ctries..
[52] Edgar A. Whitley,et al. Global Identity Policies and Technology: Do we Understand the Question? , 2010 .
[53] Elisa Bertino,et al. Biometrics-based identifiers for digital identity management , 2010, IDTRUST '10.
[54] Benjamin J Muller. Security, Risk and the Biometric State: Governing Borders and Bodies , 2010 .
[55] Anil K. Jain,et al. Biometric template transformation: a security analysis , 2010, Electronic Imaging.
[56] Luís A. Alexandre,et al. Iris recognition: Analysis of the error rates regarding the accuracy of the segmentation stage , 2010, Image Vis. Comput..
[57] B. Barak. Fully Homomorphic Encryption and Post Quantum Cryptography , 2010 .
[58] Nicolae Duta,et al. A survey of biometric technology based on hand shape , 2009, Pattern Recognit..
[59] Thad E. Hall,et al. Internet Voting in Comparative Perspective: The Case of Estonia , 2009, PS: Political Science & Politics.
[60] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[61] E. Mordini,et al. Body, Biometrics and Identity , 2008, Bioethics.
[62] B. Jenkins. Developing mobile money ecosystems , 2008 .
[63] Peter Schartner,et al. Unique User-Generated Digital Pseudonyms , 2005, MMM-ACNS.
[64] Lee Luan Ling,et al. User authentication through typing biometrics features , 2004, IEEE Transactions on Signal Processing.
[65] A. Jøsang,et al. User Centric Identity Management , 2005 .
[66] Arun Ross,et al. Multimodal biometrics: An overview , 2004, 2004 12th European Signal Processing Conference.
[67] Arun Ross,et al. Biometric template selection and update: a case study in fingerprints , 2004, Pattern Recognit..
[68] Luminita Vasiu,et al. Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.
[69] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[70] Xiaoyun Tang,et al. Using insurance to create trust on the Internet , 2003, CACM.
[71] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[72] Tadeusz Morzy,et al. Handbook on Data Management in Information Systems , 2003, International Handbooks on Information Systems.
[73] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..
[74] D. Toth. The Persona Concept : A Consumer-Centered Identity Model , 2003 .
[75] J. Suler. Identity Management in Cyberspace , 2002 .
[76] Clemens H. Cap,et al. Digital Identity and it's Implication for Electronic Government , 2001, I3E.
[77] Bruce Schneier,et al. Inside risks: the uses and abuses of biometrics , 1999, CACM.
[78] P. Eakin. How Our Lives Become Stories: Making Selves , 1999 .
[79] B. Garrett. Personal Identity and Self-Consciousness , 1998 .
[80] Adam Rifkin,et al. Weaving a Web of trust , 1997, World Wide Web J..
[81] J. Côté,et al. Sociological perspectives on identity formation: the culture-identity link and identity capital , 1996, Journal of adolescence.
[82] Tyler Burge,et al. Individualism and Self-knowledge , 1988 .
[83] L Gagnon,et al. [The International Committee of the Red Cross]. , 1967, Les cahiers du nursing.
[84] K. Sneha,et al. Blockchain Identity Management , 2022, Essential Enterprise Blockchain Concepts and Applications.