暂无分享,去创建一个
[1] Alexandra Giannopoulou,et al. Self-sovereign identity , 2021, Internet Policy Rev..
[2] Mohammed Mahmod Shuaib,et al. Immunity credentials using self-sovereign identity for combating COVID-19 pandemic , 2021, Materials Today: Proceedings.
[3] Mohammad Shabbir Alam,et al. Self-sovereign identity for healthcare using blockchain , 2021 .
[4] Q. Lu,et al. Blockchain-based Verifiable Credential Sharing with Selective Disclosure , 2020, 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).
[5] Miguel Correia,et al. SSIBAC: Self-Sovereign Identity Based Access Control , 2020, 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).
[6] N. Naik,et al. Your Identity is Yours: Take Back Control of Your Identity Using GDPR Compatible Self-Sovereign Identity , 2020, 2020 7th International Conference on Behavioural and Social Computing (BESC).
[7] Michael Kuperberg,et al. Blockchain-Based Identity Management: A Survey From the Enterprise and Ecosystem Perspective , 2020, IEEE Transactions on Engineering Management.
[8] Uyen Trang Nguyen,et al. Decentralized and Privacy-Preserving Key Management Model , 2020, 2020 International Symposium on Networks, Computers and Communications (ISNCC).
[9] Jianwei Liu,et al. An analysis of digital identity management systems - a two-mapping view , 2020, 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS).
[10] Felix Beierle,et al. Distributed-Ledger-based Authentication with Decentralized Identifiers and Verifiable Credentials , 2020, 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS).
[11] Jörn Erbguth,et al. Self-sovereign identity on public blockchains and the GDPR , 2020, SAC.
[12] Laisa Caroline de Paula Costa,et al. Self-Sovereign Identity for IoT environments: A Perspective , 2020, 2020 Global Internet of Things Summit (GIoTS).
[13] Primavera De Filippi,et al. Self-Sovereign Identity in a Globalized World: Credentials-Based Identity Systems as a Driver for Economic Inclusion , 2020, Frontiers in Blockchain.
[14] Jorge Bernal Bernabe,et al. Privacy-Preserving Solutions for Blockchain: Review and Challenges , 2019, IEEE Access.
[15] Uyen Trang Nguyen,et al. Practical Key Recovery Model for Self-Sovereign Identity Based Digital Wallets , 2019, 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech).
[16] Madini O. Alassafi,et al. In Search of Self-Sovereign Identity Leveraging Blockchain Technology , 2019, IEEE Access.
[17] Peter Mell,et al. A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems , 2019, ArXiv.
[18] Leïla Azouz Saïdane,et al. A survey on Blockchain based access control for Internet of Things , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).
[19] Thomas Hardjono,et al. Federated Authorization for User-Managed Access (UMA) 2.0 , 2019 .
[20] Miss Laiha Mat Kiah,et al. Blockchain Technology the Identity Management and Authentication Service Disruptor: A Survey , 2018, International Journal on Advanced Science, Engineering and Information Technology.
[21] Giuseppe Bianchi,et al. Scholarium: Supporting Identity Claims Through a Permissioned Blockchain , 2018, 2018 IEEE 4th International Forum on Research and Technology for Society and Industry (RTSI).
[22] Kevin Theuermann,et al. Qualified eID Derivation Into a Distributed Ledger Based IdM System , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[23] Christoph Meinel,et al. On the Relevance of Blockchain in Identity Management , 2018, ArXiv.
[24] Christoph Meinel,et al. A Survey on Essential Components of a Self-Sovereign Identity , 2018, Comput. Sci. Rev..
[25] Wei Yu,et al. A Survey of Blockchain: Techniques, Applications, and Challenges , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).
[26] Makoto Takemiya,et al. Sora Identity: Secure, Digital Identity on the Blockchain , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).
[27] Uyen Trang Nguyen,et al. A New Approach to Client Onboarding Using Self-Sovereign Identity and Distributed Ledger , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[28] Mario Zagar,et al. Comparative analysis of blockchain consensus algorithms , 2018, 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[29] Dan Boneh,et al. Bulletproofs: Short Proofs for Confidential Transactions and More , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[30] Julian Schütte,et al. reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[31] Fabien A. P. Petitcolas,et al. Decentralizing Digital Identity: Open Challenges for Distributed Ledgers , 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[32] Fabien A. P. Petitcolas,et al. A First Look at Identity Management Schemes on the Blockchain , 2018, IEEE Security & Privacy.
[33] Usman W. Chohan,et al. The Decentralized Autonomous Organization and Governance Issues , 2017 .
[34] John Callahan,et al. The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity , 2017, 2018 International Joint Conference on Neural Networks (IJCNN).
[35] Sachin Shetty,et al. Integrating blockchain for data sharing and collaboration in mobile healthcare applications , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[36] Zhang Zhe,et al. A review on consensus algorithm of blockchain , 2017, 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[37] Omri Ross,et al. KYC Optimization Using Distributed Ledger Technology , 2017, Bus. Inf. Syst. Eng..
[38] Joshua Knobe,et al. The True Self: A Psychological Concept Distinct From the Self , 2017, Perspectives on psychological science : a journal of the Association for Psychological Science.
[39] Paul A. Grassi,et al. Digital Identity Guidelines (Revised Draft) , 2017 .
[40] Naomi B. Lefkovitz,et al. An Introduction to Privacy Engineering and Risk Management in Federal Systems , 2017 .
[41] Hasnae L'Amrani,et al. Identity management systems: Laws of identity for models7 evaluation , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).
[42] Jens Groth,et al. On the Size of Pairing-Based Non-interactive Arguments , 2016, EUROCRYPT.
[43] Daniel Zappala,et al. Why Johnny Still, Still Can't Encrypt: Evaluating the Usability of a Modern PGP Client , 2015, ArXiv.
[44] Abdelmadjid Bouabdallah,et al. Trusted Execution Environment: What It is, and What It is Not , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[45] journals Iosr,et al. A Survey on Authorization Systems for Web Applications , 2015 .
[46] Michael B. Jones,et al. JSON Web Token (JWT) , 2015, RFC.
[47] V. P. Binu,et al. An effective private data storage and retrieval system using secret sharing scheme based on secure multi-party computation , 2014, 2014 International Conference on Data Science & Engineering (ICDSE).
[48] Arno Fiedler,et al. Certificate transparency , 2014, Commun. ACM.
[49] Ron Poet,et al. Mathematical Modelling of Identity, Identity Management and Other Related Topics , 2014, SIN.
[50] Huixin Wu,et al. A Survey of Noninteractive Zero Knowledge Proof System and Its Applications , 2014, TheScientificWorldJournal.
[51] Tim Bray,et al. Internet Engineering Task Force (ietf) the Javascript Object Notation (json) Data Interchange Format , 2022 .
[52] Liu Dan,et al. A key escrow scheme to IOT based on Shamir , 2013, 2013 International Conference on Communications, Circuits and Systems (ICCCAS).
[53] First A. Neha Pathak,et al. An efficient method for privacy preserving data mining in secure multiparty computation , 2013, 2013 Nirma University International Conference on Engineering (NUiCONE).
[54] Eli Ben-Sasson,et al. SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge , 2013, CRYPTO.
[55] Craig Gentry,et al. Pinocchio: Nearly Practical Verifiable Computation , 2013, 2013 IEEE Symposium on Security and Privacy.
[56] Domenico Rotondi,et al. Managing access control for things: a capability based approach , 2012, BODYNETS.
[57] Graeme G. Shanks,et al. Identity crisis: user perspectives on multiplicity and control in federated identity management , 2011, Behav. Inf. Technol..
[58] Félix Gómez Mármol,et al. TRIMS, a privacy-aware trust and reputation model for identity management systems , 2010, Comput. Networks.
[59] Eran Hammer-Lahav,et al. The OAuth 1.0 Protocol , 2010, RFC.
[60] Rachel E. Kranton,et al. Identity Economics: How Our Identities Shape Our Work, Wages, and Well-Being , 2010 .
[61] Durgesh Kumar Mishra,et al. Privacy Preserving k Secure Sum Protocol , 2009, ArXiv.
[62] Audun Jøsang,et al. Security Usability of Petname Systems , 2009, NordSec.
[63] David W. Chadwick,et al. Federated Identity Management , 2009, FOSAD.
[64] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..
[65] Claudio Soriente,et al. An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials , 2009, IACR Cryptol. ePrint Arch..
[66] Uwe Glässer,et al. Identity management architecture , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.
[67] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[68] Daniel J. Solove,et al. A Brief History of Information Privacy Law , 2006 .
[69] Rich Salz,et al. A Universally Unique IDentifier (UUID) URN Namespace , 2005, RFC.
[70] Anneli Folkesson,et al. World Wide Web Consortium (W3C) , 2005 .
[71] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[72] Benny Pinkas,et al. Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.
[73] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[74] Jan Camenisch,et al. A Signature Scheme with Efficient Protocols , 2002, SCN.
[75] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[76] Dawn Xiaodong Song,et al. Homomorphic Signature Schemes , 2002, CT-RSA.
[77] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[78] Sebastian Clauß,et al. Identity management and its support of multilateral security , 2001, Comput. Networks.
[79] J. Côté,et al. Sociological perspectives on identity formation: the culture-identity link and identity capital , 1996, Journal of adolescence.
[80] R. Cramer,et al. Linear Zero-Knowledgde. A Note on Efficient Zero-Knowledge Proofs and Arguments , 1996 .
[81] Simson L. Garfinkel,et al. PGP: Pretty Good Privacy , 1994 .
[82] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[83] Merold Westphal,et al. Oneself as Another , 1994 .
[84] Michaël Quisquater,et al. How to Explain Zero-Knowledge Protocols to Your Children , 1989, CRYPTO.
[85] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[86] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[87] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[88] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[89] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[90] Adi Shamir,et al. How to share a secret , 1979, CACM.
[91] Ralph C. Merkle,et al. Secure communications over insecure channels , 1978, CACM.
[92] L. Lunsky. Childhood and Society. , 1965 .
[93] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[94] Dimitrios Makrakis,et al. A Survey on Blockchain-Based Self-Sovereign Patient Identity in Healthcare , 2020, IEEE Access.
[95] Eli Ben-Sasson,et al. Scalable, transparent, and post-quantum secure computational integrity , 2018, IACR Cryptol. ePrint Arch..
[96] M. Ali,et al. Blockstack : A New Internet for Decentralized Applications , 2017 .
[97] Tommy Koens,et al. Efficient Zero-Knowledge Range Proofs in Ethereum , 2017 .
[98] Ghazi Ben Ayed,et al. Architecting User-Centric Privacy-as-a-Set-of-Services , 2014 .
[99] Nicole S. van der Meulen,et al. DigiNotar: Dissecting the First Dutch Digital Disaster , 2013 .
[100] A. Jøsang,et al. User Centric Identity Management , 2005 .
[101] K. Cameron,et al. The Laws of Identity , 2005 .
[102] Other. Directive 2000/60/EC of the European Parliament and of The Council of 23 October 2000 establishing a Framework for Community Action in the Field of Water Policy (Water Framework Directive) , 2000 .
[103] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[104] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[105] K. Sneha,et al. Blockchain Identity Management , 2022, Essential Enterprise Blockchain Concepts and Applications.