A New Approach to Client Onboarding Using Self-Sovereign Identity and Distributed Ledger
暂无分享,去创建一个
[1] A. Jøsang,et al. User Centric Identity Management , 2005 .
[2] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[3] Leora F. Klapper,et al. The Global Findex Database 2014: Measuring Financial Inclusion Around the World , 2015 .
[4] Vivien Quéma,et al. RBFT: Redundant Byzantine Fault Tolerance , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.
[5] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[6] Marc Pilkington,et al. Blockchain Technology: Principles and Applications , 2015 .
[7] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[8] Marc Langheinrich,et al. Privacy By Design , 2013, IEEE Pervasive Comput..
[9] David W. Chadwick,et al. Federated Identity Management , 2009, FOSAD.
[10] Peter Schaar,et al. Privacy by Design , 2010 .
[11] José G. Faísca,et al. Decentralized Semantic Identity , 2016, SEMANTiCS.
[12] Piotr Pacyna,et al. Generic and Complete Three-Level Identity Management Model , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.
[13] Jim Groom,et al. The Path to Self-Sovereign Identity , 2017 .
[14] Fabien A. P. Petitcolas,et al. A First Look at Identity Management Schemes on the Blockchain , 2018, IEEE Security & Privacy.
[15] Jan Camenisch,et al. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.
[16] Mustafa Al-Bassam. SCPKI: A Smart Contract-based PKI and Identity System , 2017 .
[17] Anthony Skjellum,et al. A brief survey of Cryptocurrency systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[18] Björn Scheuermann,et al. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.