Skip to Content

77 Results Found

  • Article
  • Open Access
939 Views
25 Pages

A Bidirectional Bridge for Cross-Chain Revocation of Verifiable Credentials in Segregated Blockchains

  • Matei Sofronie,
  • Andrei Brînzea,
  • Alexandru Bratu,
  • Iulian Aciobăniței and
  • Florin Pop

21 November 2025

Verifiable Credentials (VCs) are a core component of decentralized identity systems, enabling individuals to prove claims without centralized intermediaries. However, managing VC revocation across segregated blockchain networks remains a key interope...

  • Article
  • Open Access
17 Citations
7,461 Views
49 Pages

This paper explores the concept of digital identity in the evolving landscape of Web 3.0, focusing on the development and implications of a novel authentication scheme using verifiable credentials. The background sets the stage by placing digital ide...

  • Article
  • Open Access
3 Citations
3,182 Views
12 Pages

IoT Group Membership Management Using Decentralized Identifiers and Verifiable Credentials

  • Nikos Fotiou,
  • Vasilios A. Siris,
  • George Xylomenos and
  • George C. Polyzos

Many IoT use cases can benefit from group communication, where a user requests an IoT resource and this request can be handled by multiple IoT devices, each of which may respond back to the user. IoT group communication involves one-to-many requests...

  • Article
  • Open Access
31 Citations
7,544 Views
26 Pages

A Consortium Blockchain-Based Secure and Trusted Electronic Portfolio Management Scheme

  • Mpyana Mwamba Merlec,
  • Md. Mainul Islam,
  • Youn Kyu Lee and
  • Hoh Peter In

8 February 2022

In recent times, electronic portfolios (e-portfolios) are being increasingly used by students and lifelong learners as digital online multimedia résumés that showcase their skill sets and achievements. E-portfolios require secure, relia...

  • Feature Paper
  • Article
  • Open Access
1,812 Views
33 Pages

From Model to Mechanism: Enforcing Delegated Authority in SSI with Language-Based Security

  • Muhamed Turkanović,
  • Vid Keršič,
  • Alen Horvat,
  • Dominik Beron and
  • Špela Čučko

14 September 2025

Delegation of authority remains a critical yet insufficiently addressed capability in Self-Sovereign Identity (SSI) systems. Building on an existing delegation model that introduced the concept of a Verifiable Mandate (VM) for expressing authority an...

  • Article
  • Open Access
2 Citations
3,625 Views
26 Pages

PriSign, A Privacy-Preserving Single Sign-On System for Cloud Environments

  • Rui Shi,
  • Yang Yang,
  • Huiqin Xie,
  • Huamin Feng,
  • Guozhen Shi and
  • Jianyi Zhang

4 January 2023

Anonymous single sign-on systems allow users to use a single credential to access multiple services protected by verifiers without revealing their personal information, which is especially important due to privacy regulations such as GDPR. In this pa...

  • Feature Paper
  • Article
  • Open Access
320 Views
23 Pages

10 February 2026

Digital product passports outline information about a product’s lifecycle, circularity, and sustainability-related data. Sustainability data contains claims about carbon footprint, recycled material composition, ethical sourcing of production m...

  • Article
  • Open Access
43 Citations
10,589 Views
20 Pages

The European Blockchain Services Infrastructure (EBSI) is a major policy initiative of the EU and European Blockchain Partnership, to leverage blockchain to create cross-border services for public administrations, businesses, citizens, and their ecos...

  • Article
  • Open Access
17 Citations
5,512 Views
23 Pages

Towards a Catalogue of Self-Sovereign Identity Design Patterns

  • Špela Čučko,
  • Vid Keršič and
  • Muhamed Turkanović

26 April 2023

Self-sovereign identity (SSI) is a user-centric, decentralised identity approach that provides a means for identification, authentication, and authorisation without the involvement of external entities, responsible for identity provisioning and manag...

  • Article
  • Open Access
1 Citations
1,514 Views
36 Pages

SIBERIA: A Self-Sovereign Identity and Multi-Factor Authentication Framework for Industrial Access

  • Daniel Paredes-García,
  • José Álvaro Fernández-Carrasco,
  • Jon Ander Medina López,
  • Juan Camilo Vasquez-Correa,
  • Imanol Jericó Yoldi,
  • Santiago Andrés Moreno-Acevedo,
  • Ander González-Docasal,
  • Haritz Arzelus Irazusta,
  • Aitor Álvarez Muniain and
  • Yeray de Diego Loinaz

2 August 2025

The growing need for secure and privacy-preserving identity management in industrial environments has exposed the limitations of traditional, centralized authentication systems. In this context, SIBERIA was developed as a modular solution that empowe...

  • Article
  • Open Access
444 Views
23 Pages

18 February 2026

The rapid expansion of the Internet of Things (IoT) has led to billions of interconnected devices generating and exchanging sensitive data across diverse domains, which introduces challenges in identity management (IdM) regarding privacy, scalability...

  • Article
  • Open Access
1 Citations
4,591 Views
28 Pages

Unlinkable Revocation Lists for Qualified Electronic Attestations: A Blockchain-Based Framework

  • Emil Bureacă,
  • Răzvan-Andrei Leancă,
  • Ionuț Ciobanu,
  • Andrei Brînzea and
  • Iulian Aciobăniței

The use of Verifiable Credentials under the new eIDAS Regulation introduces privacy concerns, particularly during revocation status checks. This paper proposes a privacy-preserving revocation mechanism tailored to the European Digital Identity Wallet...

  • Review
  • Open Access
17 Citations
4,853 Views
25 Pages

The heterogeneous and decentralized nature of renewable energy sources is too much to handle for traditional and centralized IT grid infrastructure. Blockchain technology can address many of the associated challenges. This paper provides an overview...

  • Communication
  • Open Access
6 Citations
5,511 Views
30 Pages

10 January 2025

Global supply chains, especially in commodity trading, are plagued by fragmentation, lack of transparency, and trust deficits among participants. These issues lead to inefficiencies, increased costs, and an over-reliance on intermediaries. The presen...

  • Article
  • Open Access
9 Citations
6,513 Views
14 Pages

25 November 2024

The increasing connectivity and complexity of automotive systems require enhanced mechanisms for firmware updates to ensure security and integrity. Traditional methods are insufficient for modern vehicles that require seamless over-the-air (OTA) upda...

  • Article
  • Open Access
46 Citations
10,733 Views
24 Pages

Privacy and Trust Redefined in Federated Machine Learning

  • Pavlos Papadopoulos,
  • Will Abramson,
  • Adam J. Hall,
  • Nikolaos Pitropakis and
  • William J. Buchanan

A common privacy issue in traditional machine learning is that data needs to be disclosed for the training procedures. In situations with highly sensitive data such as healthcare records, accessing this information is challenging and often prohibited...

  • Article
  • Open Access
38 Citations
12,070 Views
21 Pages

16 February 2021

The European Union Emissions Trading System (EU ETS) is a major pillar of the European energy policy to reduce greenhouse gas emissions. However, the reportedly pervasive frauds in this market are constraining the beneficial role of the EU ETS. In th...

  • Article
  • Open Access
6 Citations
1,682 Views
22 Pages

8 May 2024

As the usage of electric vehicles (EVs) expands, various energy management technologies, including battery energy storage systems, are being developed to efficiently charge EVs using various energy sources. In recent years, many blockchain-based ener...

  • Article
  • Open Access
2 Citations
4,620 Views
36 Pages

30 September 2025

The widespread circulation of digital misinformation exposes a critical shortcoming in prevailing detection strategies, namely, the absence of robust mechanisms to confirm the origin and authenticity of online content. This study addresses this by in...

  • Article
  • Open Access
24 Citations
6,234 Views
25 Pages

23 October 2022

As of 2022, non-fungible tokens, or NFTs, the smart contract powered tokens that represent ownership in a specific digital asset, have become a popular investment vehicle. In 2021, NFT trading reached USD 17.6 billion and entered mainstream media wit...

  • Article
  • Open Access
7 Citations
3,277 Views
21 Pages

Data-Driven Intelligent Platforms—Design of Self-Sovereign Data Trust Systems

  • Ana Balan,
  • Andi Gabriel Tan,
  • Karima Kourtit and
  • Peter Nijkamp

13 June 2023

Urban areas provide the seedbed conditions for a variety of agglomeration advantages, including incubator conditions for the ICT sector. This study aims to present the foundations for a data-driven digital architecture based on the notion of open acc...

  • Article
  • Open Access
24 Citations
6,265 Views
19 Pages

Blockchain-Based Supply Chain Systems, Interoperability Model in a Pharmaceutical Case Study

  • Yeray Mezquita,
  • Blaž Podgorelec,
  • Ana Belén Gil-González and
  • Juan Manuel Corchado

9 February 2023

The main purpose of supply chain systems based on blockchain technology is to take advantage of technology innovations to ensure that a tracked asset’s audit trail is immutable. However, the challenge lies in tracking the asset among different...

  • Article
  • Open Access
287 Views
29 Pages

Trustworthy Identity and Access Management (IAM) is a foundational requirement for federated data trading platforms, yet existing solutions often rely on centralized Identity Providers (IdPs), lack cross-border interoperability, and offer limited sup...

  • Article
  • Open Access
2,135 Views
26 Pages

Transparent Digital Governance: A Blockchain-Based Workflow Audit Application

  • Constantin Viorel Marian,
  • Dan Alexandru Mitrea,
  • Dinu Stefan Rusu and
  • Andrei Vasilateanu

1 November 2025

Digital governance requires transparent, auditable, and secure mechanisms for document circulation across public institutions. Existing workflow management and e-government systems, especially in the legislative field, often lack end-to-end auditabil...

  • Article
  • Open Access
861 Views
9 Pages

18 November 2025

Data spaces are digital realms of data and information shared between stakeholders and peer groups. They underpin several developments in sectors ranging from the automotive industry, through social sciences, to governmental networks. Digital traceab...

  • Article
  • Open Access
1 Citations
2,676 Views
18 Pages

Design and Implementation of an Anonymous and Secure Online Evaluation Protocol

  • Nikolaos Petrakos,
  • Stefanos Monachos,
  • Emmanouil Magkos and
  • Panayiotis Kotzanikolaou

1 September 2020

Course evaluations have become a common practice in most academic environments. To enhance participation, evaluations should be private and ensure a fair result. Related privacy-preserving method and technologies (e.g., anonymous credentials, Privacy...

  • Article
  • Open Access
4 Citations
2,537 Views
19 Pages

29 September 2022

Public healthcare has transformed from treatment to preventive care and disease management. The Common Data Model (CDM) provides a standard data structure defined to utilize hospitals’ data. Digital identity takes a significant role as the body...

  • Article
  • Open Access
48 Citations
4,947 Views
20 Pages

Blockchain Hyperledger with Non-Linear Machine Learning: A Novel and Secure Educational Accreditation Registration and Distributed Ledger Preservation Architecture

  • Zaffar Ahmed Shaikh,
  • Abdullah Ayub Khan,
  • Laura Baitenova,
  • Gulmira Zambinova,
  • Natalia Yegina,
  • Natalia Ivolgina,
  • Asif Ali Laghari and
  • Sergey Evgenievich Barykin

28 February 2022

This paper proposes a novel and secure blockchain hyperledger sawtooth-enabled consortium analytical model for smart educational accreditation credential evaluation. Indeed, candidate academic credentials are generated, verified, and validated by the...

  • Article
  • Open Access
28 Citations
6,027 Views
23 Pages

Roaming Service for Electric Vehicle Charging Using Blockchain-Based Digital Identity

  • Joao C. Ferreira,
  • Catarina Ferreira da Silva and
  • Jose P. Martins

18 March 2021

We present a suitable approach to address the electric vehicle charging roaming problem (e-roaming). Blockchain technologies are applied to support the identity management process of users charging their vehicles and to record energy transactions sec...

  • Article
  • Open Access
5 Citations
3,722 Views
15 Pages

19 August 2020

Permissioned blockchains can be applied for sharing data among permitted users to authorise the data access requests in a permissioned blockchain. A consensus network constructed using pre-selected nodes should verify a data requester’s credent...

  • Review
  • Open Access
1 Citations
2,424 Views
35 Pages

There is a growing pressure on industry to secure environments and demonstrate their commitment in taking right steps to secure their products. This is because of the growing number of security compromises in the IT industry, Operational Technology e...

  • Article
  • Open Access
1 Citations
2,176 Views
17 Pages

11 August 2025

Distributed digital identity is an emerging identity management technology aimed at achieving comprehensive interconnectivity between digital objects. However, there is still the problem of privacy leakage in distributed identities, and selective dis...

  • Review
  • Open Access
10 Citations
4,825 Views
33 Pages

Climate and Biodiversity Credentials for Australian Grass-Fed Beef: A Review of Standards, Certification and Assurance Schemes

  • Dean T. Thomas,
  • Gonzalo Mata,
  • Andrew F. Toovey,
  • Peter W. Hunt,
  • Gene Wijffels,
  • Rebecca Pirzl,
  • Maren Strachan and
  • Brad G. Ridoutt

20 September 2023

Extensive livestock production occupies 25% of the ice-free terrestrial surface of the Earth, and Australian beef production contributes about 10% of this total land footprint. Therefore, the management of cattle has major implications for natural ve...

  • Article
  • Open Access
5 Citations
3,118 Views
14 Pages

Attribute Based Pseudonyms: Anonymous and Linkable Scoped Credentials

  • Francesc Garcia-Grau,
  • Jordi Herrera-Joancomartí and
  • Aleix Dorca Josa

22 July 2022

Attribute-based credentials (ABCs) provide an efficient way to transfer custody of personal and private data to the final user, while minimizing the risk of sensitive data revelation and thus granting anonymity. Nevertheless, this method cannot detec...

  • Feature Paper
  • Article
  • Open Access
40 Citations
8,515 Views
19 Pages

IPFS-Blockchain Smart Contracts Based Conceptual Framework to Reduce Certificate Frauds in the Academic Field

  • Shaik Arshiya Sultana,
  • Chiramdasu Rupa,
  • Ramanadham Pavana Malleswari and
  • Thippa Reddy Gadekallu

7 August 2023

In the digital age, ensuring the authenticity and security of academic certificates is a critical challenge faced by educational institutions, employers, and individuals alike. Traditional methods for verifying academic credentials are often cumberso...

  • Article
  • Open Access
15 Citations
5,221 Views
22 Pages

22 October 2023

Anonymity forms the basis of decentralized ecosystems, leading to an increase in criminal activities such as money laundering and illegal currency trading. Especially in blockchain-based metaverse services, activities such as preventing sexual crimes...

  • Review
  • Open Access
14 Citations
7,707 Views
24 Pages

A Systematic Review on Professional Regulation and Credentialing of Public Health Workforce

  • Olga Gershuni,
  • Jason M. Orr,
  • Abby Vogel,
  • Kyeongki Park,
  • Jonathon P. Leider,
  • Beth A. Resnick and
  • Katarzyna Czabanowska

The public health workforce (PHW) counts a great variety of professionals, and how services are delivered differs in every country. The complexity and the diversity of PHW professions also reflect structural problems of supply and demand of PHW in va...

  • Article
  • Open Access
25 Citations
9,334 Views
26 Pages

1 November 2022

As the world is gradually moving towards digitization, forgery of vital digital documents has become relatively easy. Therefore, the need for efficient and secure verification and authentication practices of digital documents is also increasing. Self...

  • Article
  • Open Access
1 Citations
1,352 Views
34 Pages

Enhancing Transparency and Trust in Higher Education Institutions via Blockchain: A Conceptual Model Utilizing the Ethereum Consortium Approach

  • Yerlan Kistaubayev,
  • Francisco Liébana-Cabanillas,
  • Aijaz A. Shaikh,
  • Galimkair Mutanov,
  • Olga Ussatova and
  • Ainura Shinbayeva

21 October 2025

It has been recognized that Blockchain technology contributes to environmentally sustainable development goals (SDGs). It has emerged as a disruptive innovation capable of transforming various economic and social sectors significantly. This conceptua...

  • Article
  • Open Access
6 Citations
3,024 Views
28 Pages

29 November 2023

The novel contribution of this research is decentralised IOTA-based concepts of digital trust for securing remote driving in an urban environment. The conceptual solutions are studied and described, and respective experimental solutions are developed...

  • Article
  • Open Access
16 Citations
6,342 Views
18 Pages

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

  • Owen Lo,
  • William J. Buchanan,
  • Sarwar Sayeed,
  • Pavlos Papadopoulos,
  • Nikolaos Pitropakis and
  • Christos Chrysoulas

16 March 2022

E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evolution of digital technologies has often created the necessity for th...

  • Article
  • Open Access
11 Citations
3,672 Views
15 Pages

13 December 2024

Due to the openness of communication channels and the sensitivity of the data being collected and transmitted, securing data access and communication in IoT systems requires robust ECC-based authentication and key agreement (AKA) protocols. However,...

  • Article
  • Open Access
2,072 Views
29 Pages

Trustworthy Communities for Critical Energy and Mobility Cyber-Physical Applications

  • Juhani Latvakoski,
  • Jouni Heikkinen,
  • Jari Palosaari,
  • Vesa Kyllönen and
  • Jari Rehu

12 September 2024

The aim of this research has been to enable the management of trustworthy relationships between stakeholders, service providers, and physical assets, which are required in critical energy and mobility cyber–physical systems (CPS) applications....

  • Article
  • Open Access
2 Citations
1,772 Views
20 Pages

Intelligent Carbon Metering and Settlement Method of New Power System Based on Blockchain Technology

  • Ruxin Wen,
  • Wen Tian,
  • Huiying Liu,
  • Wenjuan Lin,
  • Xizhong Zhou and
  • Xuerong Li

9 November 2024

Blockchain technology is an important technical basis for ensuring carbon trading and plays a fundamental role in maintaining fairness in the carbon trading market. This paper proposes a carbon emission metering and settlement method and a system bas...

  • Article
  • Open Access
504 Views
28 Pages

27 November 2025

Frequent data sharing in Vehicular Ad Hoc Networks (VANETs) necessitates a robust foundation of secure access control to ensure data security. Existing ciphertext-policy attribute-based encryption schemes are constrained by the performance bottleneck...

  • Article
  • Open Access
134 Citations
8,174 Views
15 Pages

24 July 2013

Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models a...

  • Article
  • Open Access
35 Citations
9,909 Views
17 Pages

Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication

  • Nyle Siddiqui,
  • Rushit Dave,
  • Mounika Vanamala and
  • Naeem Seliya

Static authentication methods, like passwords, grow increasingly weak with advancements in technology and attack strategies. Continuous authentication has been proposed as a solution, in which users who have gained access to an account are still moni...

  • Article
  • Open Access
1 Citations
1,612 Views
16 Pages

An Ordered Universal Accumulator Based on a Hash Chain

  • Wenbao Jiang,
  • Jinquan Li,
  • Yangnan Guo and
  • Haibao Zhang

27 February 2025

Cryptographic accumulators are now fundamental for secure applications across blockchain, IoT, and big data, powering anonymous credentials, streamlining key management, and enabling efficient data filtering. However, existing accumulator methods, li...

  • Article
  • Open Access
2 Citations
2,562 Views
15 Pages

3 February 2020

In order to enhance the recall and the precision performance of data integrity detection, a method to detect the network storage data integrity based on symmetric difference was proposed. Through the complete automatic image annotation system, the cr...

  • Article
  • Open Access
21 Citations
5,189 Views
21 Pages

Data Protection by Design in the Context of Smart Cities: A Consent and Access Control Proposal

  • Said Daoudagh,
  • Eda Marchetti,
  • Vincenzo Savarino,
  • Jorge Bernal Bernabe,
  • Jesús García-Rodríguez,
  • Rafael Torres Moreno,
  • Juan Antonio Martinez and
  • Antonio F. Skarmeta

28 October 2021

The growing availability of mobile devices has lead to an arising development of smart cities services that share a huge amount of (personal) information and data. Without accurate and verified management, they could become severe back-doors for secu...

of 2