Towards a Multi-party, Blockchain-Based Identity Verification Solution to Implement Clear Name Laws for Online Media Platforms
暂无分享,去创建一个
Thomas Grechenig | Stefan Strobl | Dominik Schmelz | Karl Pinter | Rene Lamber | T. Grechenig | Dominik Schmelz | K. Pinter | René Lamber | S. Strobl
[1] Clare Linda Sullivan,et al. Blockchain, Digital Identity, E-government , 2018, Business Transformation through Blockchain.
[2] Jens Terboven. Postident Online with the new Personal Identity Card , 2010, ISSE.
[3] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[4] Omri Ross,et al. KYC Optimization Using Distributed Ledger Technology , 2017, WI 2017.
[5] Makoto Takemiya,et al. Sora Identity: Secure, Digital Identity on the Blockchain , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).
[6] Jong-Hyouk Lee,et al. BIDaaS: Blockchain Based ID As a Service , 2018, IEEE Access.
[7] B. Koppel,et al. Analysis of a hardware security module's high-availability setting , 2013, IEEE Security & Privacy.
[8] Omri Ross,et al. Correction to: KYC Optimization Using Distributed Ledger Technology , 2017 .
[9] Werner Ogris,et al. Die Zensur in der Ära Metternich , 2006 .
[10] S. Jagannatha,et al. Analysis of Blockchain technology: pros, cons and SWOT , 2018, Cluster Computing.
[11] Amos Fiat,et al. Zero Knowledge Proofs of Identity , 1987, STOC.
[12] Bernd Zwattendorfer,et al. A privacy-preserving eID based Single Sign-On solution , 2011, 2011 5th International Conference on Network and System Security.
[13] Jef Ausloos,et al. The Right to Be Forgotten Across the Pond , 2013, Journal of Information Policy.
[14] Reinhard Posch,et al. Secure and Privacy-Preserving eGovernment - Best Practice Austria , 2011, Rainbow of Computer Science.
[15] Jesus Carretero,et al. Federated Identity Architecture of the European eID System , 2018, IEEE Access.
[16] Amir Herzberg,et al. Off-Path Hacking: The Illusion of Challenge-Response Authentication , 2014, IEEE Security & Privacy.
[17] Peter Schaar,et al. Privacy by Design , 2010 .
[18] Ladislav Huraj,et al. A Study of DDoS Reflection Attack on Internet of Things in IPv4/IPv6 Networks , 2019, CSOC.
[19] Nazmun Naher,et al. Authentication of Diffie-Hellman Protocol Against Man-in-the-Middle Attack Using Cryptographically Secure CRC , 2019 .
[20] Helmut Krcmar,et al. Towards the Implementation of the EU-Wide "Once-Only Principle": Perceptions of Citizens in the DACH-Region , 2018, EGOV.
[21] R. Posch,et al. Das Konzept Bürgerkarte und erste Ausprägungen , 2003 .
[22] Gerhard Kunnert. EuGH zur Vorratsdatenspeicherung: Außer Spesen nichts gewesen? , 2014, Datenschutz und Datensicherheit - DuD.
[23] Thomas Lenz,et al. Towards Domain-Specific and Privacy-Preserving Qualified eID in a User-Centric Identity Model , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[24] Mohammad Nurul Huda,et al. Know your customer (KYC) based authentication method for financial services through the internet , 2016, 2016 19th International Conference on Computer and Information Technology (ICCIT).
[25] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[26] Alessandro Acquisti,et al. Empirical analysis of online anonymity and user behaviors: the impact of real name policy , 2012, 2012 45th Hawaii International Conference on System Sciences.
[27] Werasak Kurutach,et al. A Practical National Digital ID Framework on Blockchain (NIDBC) , 2018, 2018 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON).
[28] Cédric Lauradoux,et al. Performances of cryptographic accumulators , 2014, 39th Annual IEEE Conference on Local Computer Networks.
[29] Chris Speed,et al. Making Sense of Blockchain Applications: A Typology for HCI , 2018, CHI.