This work is licensed under the Creative Commons Attribution 4.0 International License.
Wang, B., Jiawei, S., Wang, W., & Zhao, P. (2022). Image copyright protection based on blockchain and zero-watermark. IEEE Transactions on Network Science and Engineering, 9(4), 2188-2199.WangB.JiaweiS.WangW.ZhaoP. (2022). Image copyright protection based on blockchain and zero-watermark. IEEE Transactions on Network Science and Engineering, 9(4), 2188-2199.Search in Google Scholar
Sahoo, S., & Halder, R. (2021). Traceability and ownership claim of data on big data marketplace using blockchain technology. Journal of Information and Telecommunication, 5(1), 35-61.SahooS.HalderR. (2021). Traceability and ownership claim of data on big data marketplace using blockchain technology. Journal of Information and Telecommunication, 5(1), 35-61.Search in Google Scholar
Zhaofeng, M., Lingyun, W., Xiaochang, W., Zhen, W., & Weizhe, Z. (2019). Blockchain-enabled decentralized trust management and secure usage control of IoT big data. IEEE Internet of Things Journal, 7(5), 4000-4015.ZhaofengM.LingyunW.XiaochangW.ZhenW.WeizheZ. (2019). Blockchain-enabled decentralized trust management and secure usage control of IoT big data. IEEE Internet of Things Journal, 7(5), 4000-4015.Search in Google Scholar
Ibáñez, L. D., O’Hara, K., & Simperl, E. (2018, July). On blockchains and the general data protection regulation. EU Blockchain Forum and Observatory.IbáñezL. D.O’HaraK.SimperlE. (2018, July). On blockchains and the general data protection regulation. EU Blockchain Forum and Observatory.Search in Google Scholar
Shaik, M. (2022). Rethinking Federated Identity Management: A Blockchain-Enabled Framework for Enhanced Security, Interoperability, and User Sovereignty. Blockchain Technology and Distributed Systems, 2(1), 21-45.ShaikM. (2022). Rethinking Federated Identity Management: A Blockchain-Enabled Framework for Enhanced Security, Interoperability, and User Sovereignty. Blockchain Technology and Distributed Systems, 2(1), 21-45.Search in Google Scholar
Chen, R., Shu, F., Huang, S., Huang, L., Liu, H., Liu, J., & Lei, K. (2021). Bidm: a blockchain-enabled cross-domain identity management system. Journal of Communications and Information Networks, 6(1), 44-58.ChenR.ShuF.HuangS.HuangL.LiuH.LiuJ.LeiK. (2021). Bidm: a blockchain-enabled cross-domain identity management system. Journal of Communications and Information Networks, 6(1), 44-58.Search in Google Scholar
Das, D., Dasgupta, K., & Biswas, U. (2023). A secure blockchain-enabled vehicle identity management framework for intelligent transportation systems. Computers and Electrical Engineering, 105, 108535.DasD.DasguptaK.BiswasU. (2023). A secure blockchain-enabled vehicle identity management framework for intelligent transportation systems. Computers and Electrical Engineering, 105, 108535.Search in Google Scholar
Zwitter, A. J., Gstrein, O. J., & Yap, E. (2020). Digital identity and the blockchain: universal identity management and the concept of the “Self-Sovereign” individual. Frontiers in Blockchain, 3, 26.ZwitterA. J.GstreinO. J.YapE. (2020). Digital identity and the blockchain: universal identity management and the concept of the “Self-Sovereign” individual. Frontiers in Blockchain, 3, 26.Search in Google Scholar
Chanson, M., Bogner, A., Bilgeri, D., Fleisch, E., & Wortmann, F. (2019). Blockchain for the IoT: privacy-preserving protection of sensor data. Journal of the Association for Information Systems, 20(9), 1274-1309.ChansonM.BognerA.BilgeriD.FleischE.WortmannF. (2019). Blockchain for the IoT: privacy-preserving protection of sensor data. Journal of the Association for Information Systems, 20(9), 1274-1309.Search in Google Scholar
Rantos, K., Drosatos, G., Kritsas, A., Ilioudis, C., Papanikolaou, A., & Filippidis, A. P. (2019). A Blockchain‐Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem. Security and Communication Networks, 2019(1), 1431578.RantosK.DrosatosG.KritsasA.IlioudisC.PapanikolaouA.FilippidisA. P. (2019). A Blockchain‐Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem. Security and Communication Networks, 2019(1), 1431578.Search in Google Scholar
Faber, B., Michelet, G., Weidmann, N., Mukkamala, R. R., & Vatrapu, R. (2019). BPDIMS: A blockchain-based personal data and identity management system. In The 52nd Hawaii International Conference on System Sciences. HISS 2019: HISS 2019 (pp. 6855-6864). Hawaii International Conference on System Sciences (HICSS).FaberB.MicheletG.WeidmannN.MukkamalaR. R.VatrapuR. (2019). BPDIMS: A blockchain-based personal data and identity management system. In The 52nd Hawaii International Conference on System Sciences. HISS 2019: HISS 2019 (pp. 6855-6864). Hawaii International Conference on System Sciences (HICSS).Search in Google Scholar
Fan, K., Ren, Y., Wang, Y., Li, H., & Yang, Y. (2018). Blockchain‐based efficient privacy preserving and data sharing scheme of content‐centric network in 5G. IET communications, 12(5), 527-532.FanK.RenY.WangY.LiH.YangY. (2018). Blockchain‐based efficient privacy preserving and data sharing scheme of content‐centric network in 5G. IET communications, 12(5), 527-532.Search in Google Scholar
Makhdoom, I., Zhou, I., Abolhasan, M., Lipman, J., & Ni, W. (2020). PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Computers & Security, 88, 101653.MakhdoomI.ZhouI.AbolhasanM.LipmanJ.NiW. (2020). PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Computers & Security, 88, 101653.Search in Google Scholar
Sadhu, A. K. R. (2021). Reimagining Digital Identity Management: A Critical Review of Blockchain-Based Identity and Access Management (IAM) Systems-Architectures, Security Mechanisms, and Industry-Specific Applications. Advances in Deep Learning Techniques, 1(2), 1-22.SadhuA. K. R. (2021). Reimagining Digital Identity Management: A Critical Review of Blockchain-Based Identity and Access Management (IAM) Systems-Architectures, Security Mechanisms, and Industry-Specific Applications. Advances in Deep Learning Techniques, 1(2), 1-22.Search in Google Scholar
Kikitamara, S., van Eekelen, M. C. J. D., & Doomernik, D. I. J. P. (2017). Digital identity management on blockchain for open model energy system. Unpublished Masters thesis–Information Science.KikitamaraS.van EekelenM. C. J. D.DoomernikD. I. J. P. (2017). Digital identity management on blockchain for open model energy system. Unpublished Masters thesis–Information Science.Search in Google Scholar
Jiménez-Gómez, B. S. (2019). Risks of blockchain for data protection: a European approach. Santa Clara High Tech. LJ, 36, 281.Jiménez-GómezB. S. (2019). Risks of blockchain for data protection: a European approach. Santa Clara High Tech. LJ, 36, 281.Search in Google Scholar
Vishwa, A., & Hussain, F. K. (2018, November). A blockchain based approach for multimedia privacy protection and provenance. In 2018 IEEE symposium series on computational intelligence (SSCI) (pp. 1941-1945). IEEE.VishwaA.HussainF. K. (2018, November). A blockchain based approach for multimedia privacy protection and provenance. In 2018 IEEE symposium series on computational intelligence (SSCI) (pp. 1941-1945). IEEE.Search in Google Scholar
Liang, W., Yang, Y., Yang, C., Hu, Y., Xie, S., Li, K. C., & Cao, J. (2022). PDPChain: A consortium blockchain-based privacy protection scheme for personal data. IEEE Transactions on Reliability, 72(2), 586-598.LiangW.YangY.YangC.HuY.XieS.LiK. C.CaoJ. (2022). PDPChain: A consortium blockchain-based privacy protection scheme for personal data. IEEE Transactions on Reliability, 72(2), 586-598.Search in Google Scholar
Truong, N. B., Sun, K., Lee, G. M., & Guo, Y. (2019). Gdpr-compliant personal data management: A blockchain-based solution. IEEE Transactions on Information Forensics and Security, 15, 1746-1761.TruongN. B.SunK.LeeG. M.GuoY. (2019). Gdpr-compliant personal data management: A blockchain-based solution. IEEE Transactions on Information Forensics and Security, 15, 1746-1761.Search in Google Scholar
Liu, Y., He, D., Obaidat, M. S., Kumar, N., Khan, M. K., & Choo, K. K. R. (2020). Blockchain-based identity management systems: A review. Journal of network and computer applications, 166, 102731.LiuY.HeD.ObaidatM. S.KumarN.KhanM. K.ChooK. K. R. (2020). Blockchain-based identity management systems: A review. Journal of network and computer applications, 166, 102731.Search in Google Scholar
Naik, N., & Jenkins, P. (2020, October). Governing principles of self-sovereign identity applied to blockchain enabled privacy preserving identity management systems. In 2020 IEEE International Symposium on Systems Engineering (ISSE) (pp. 1-6). IEEE.NaikN.JenkinsP. (2020, October). Governing principles of self-sovereign identity applied to blockchain enabled privacy preserving identity management systems. In 2020 IEEE International Symposium on Systems Engineering (ISSE) (pp. 1-6). IEEE.Search in Google Scholar
Stockburger, L., Kokosioulis, G., Mukkamala, A., Mukkamala, R. R., & Avital, M. (2021). Blockchain-enabled decentralized identity management: The case of self-sovereign identity in public transportation. Blockchain: Research and Applications, 2(2), 100014.StockburgerL.KokosioulisG.MukkamalaA.MukkamalaR. R.AvitalM. (2021). Blockchain-enabled decentralized identity management: The case of self-sovereign identity in public transportation. Blockchain: Research and Applications, 2(2), 100014.Search in Google Scholar
Kuperberg, M. (2019). Blockchain-based identity management: A survey from the enterprise and ecosystem perspective. IEEE Transactions on Engineering Management, 67(4), 1008-1027.KuperbergM. (2019). Blockchain-based identity management: A survey from the enterprise and ecosystem perspective. IEEE Transactions on Engineering Management, 67(4), 1008-1027.Search in Google Scholar
Xiaohua Wu,Zirui Wang,Xiaoyu Li & Lei Chen. (2025). DBPBFT: A hierarchical PBFT consensus algorithm with dual blockchain for IoT. Future Generation Computer Systems107429-107429.XiaohuaWuZiruiWangXiaoyuLiLeiChen (2025). DBPBFT: A hierarchical PBFT consensus algorithm with dual blockchain for IoT. Future Generation Computer Systems107429-107429.Search in Google Scholar
Mujtaba Hassan,Arish Sateesan,Jo Vliegen,Stjepan Picek & Nele Mentens. (2024). A Genetic Programming approach for hardware-oriented hash functions for network security applications. Applied Soft Computing112078-112078.MujtabaHassanArishSateesanJoVliegenStjepanPicekNeleMentens (2024). A Genetic Programming approach for hardware-oriented hash functions for network security applications. Applied Soft Computing112078-112078.Search in Google Scholar
Yichuan Wang,Yiliang Yan,Yaling Zhang,Mengjie Tian & Xiaoxue Liu. (2024). Ensuring Cross-Chain Transmission Technique Utilizing TPM and Establishing Cross-Trusted Root Security via SM Algorithm. Electronics(15),2978-2978.YichuanWangYiliangYanYalingZhangMengjieTianXiaoxueLiu (2024). Ensuring Cross-Chain Transmission Technique Utilizing TPM and Establishing Cross-Trusted Root Security via SM Algorithm. Electronics(15),2978-2978.Search in Google Scholar
Yichuan Wang,Yiliang Yan,Yaling Zhang,Mengjie Tian & Xiaoxue Liu. (2024). Ensuring Cross-Chain Transmission Technique Utilizing TPM and Establishing Cross-Trusted Root Security via SM Algorithm. Electronics(15),2978-2978.YichuanWangYiliangYanYalingZhangMengjieTianXiaoxueLiu (2024). Ensuring Cross-Chain Transmission Technique Utilizing TPM and Establishing Cross-Trusted Root Security via SM Algorithm.Electronics(15),2978-2978.Search in Google Scholar