UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 127
1.
  • Blockchain based energy tra... Blockchain based energy trading scheme for vehicle-to-vehicle using decentralized identifiers
    Kim, Myeonghyun; Lee, Joonyoung; Oh, Jihyeon ... Applied energy, 09/2022, Letnik: 322
    Journal Article
    Recenzirano

    A blockchain-based energy trading system is a new paradigm of grid infrastructure, which allows that energy purchaser and seller can efficiently exchange the energy through two-way communication. ...
Celotno besedilo
2.
  • Designing a Framework for D... Designing a Framework for Digital KYC Processes Built on Blockchain-Based Self-Sovereign Identity
    Schlatt, Vincent; Sedlmeir, Johannes; Feulner, Simon ... Information & management, 11/2022, Letnik: 59, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    •SSI can make KYC processes completely digital, efficient, compliant, and convenient.•No personal data need to be stored on a blockchain.•SSI inhibits data silos, lock-in effects, and aggregation of ...
Celotno besedilo

PDF
3.
  • BDIM: A Blockchain-Based De... BDIM: A Blockchain-Based Decentralized Identity Management Scheme for Large Scale Internet of Things
    Xiong, Ruoting; Ren, Wei; Hao, Xiaohan ... IEEE internet of things journal, 12/2023, Letnik: 10, Številka: 24
    Journal Article

    In large-scale Internet of Things, centralized authentication imposes several critical challenges in terms of vast identity management, authentication overhead, and single point of failure. ...
Celotno besedilo
4.
  • A Systematic Review of Iden... A Systematic Review of Identity and Access Management Requirements in Enterprises and Potential Contributions of Self-Sovereign Identity
    Glöckler, Jana; Sedlmeir, Johannes; Frank, Muriel ... Business & information systems engineering, 09/2023
    Journal Article
    Recenzirano
    Odprti dostop

    Abstract Digital identity and access management (IAM) poses significant challenges for companies. Cyberattacks and resulting data breaches frequently have their root cause in enterprises’ IAM ...
Celotno besedilo
5.
  • An evaluation of potential ... An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity
    Naik, Nitin; Grace, Paul; Jenkins, Paul ... Computers & security, September 2022, 2022-09-00, Letnik: 120
    Journal Article
    Recenzirano
    Odprti dostop

    Self-Sovereign Identity (SSI) empowers users to govern their digital identity and personal data. This approach has changed the identity paradigm where users become the central governor of their ...
Celotno besedilo
6.
  • Verifiable Credential Proof... Verifiable Credential Proof Generation and Verification Model for Decentralized SSI-Based Credit Scoring Data
    CHO, Kang Woo; JEONG, Byeong-Gyu; SHIN, Sang Uk IEICE Transactions on Information and Systems, 11/2021, Letnik: E104.D, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    The continuous development of the mobile computing environment has led to the emergence of fintech to enable convenient financial transactions in this environment. Previously proposed financial ...
Celotno besedilo

PDF
7.
  • DSMAC: Privacy-Aware Decent... DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data
    Saidi, Hafida; Labraoui, Nabila; Ari, Ado Adamou Abba ... IEEE access, 2022, Letnik: 10
    Journal Article
    Recenzirano
    Odprti dostop

    In recent years, the interest in using wireless communication technologies and mobile devices in the healthcare environment has increased. However, despite increased attention to the security of ...
Celotno besedilo
8.
  • On the integration of Self-... On the integration of Self-Sovereign Identity with TLS 1.3 handshake to build trust in IoT systems
    Perugini, Leonardo; Vesco, Andrea Internet of things (Amsterdam. Online), April 2024, 2024-04-00, Letnik: 25
    Journal Article
    Recenzirano
    Odprti dostop

    The centralized PKI is not a suitable solution to provide identities in large-scale IoT systems. The main problem is the high cost of managing X.509 certificates throughout their lifecycle, from ...
Celotno besedilo
9.
  • Competency frameworks, alte... Competency frameworks, alternative credentials and the evolving relationship of higher education and employers in recognizing skills and achievements
    Braxton, Sherri Nicole The international journal of information and learning technology, 10/2023, Letnik: 40, Številka: 5
    Journal Article
    Recenzirano

    PurposeRecognizing, tracking and providing mechanisms for sharing an individual's comprehensive record of learning is necessary and essential for both her agency over and ability to manage sharing ...
Celotno besedilo
10.
  • A Reliable and Privacy-Pres... A Reliable and Privacy-Preserving Vehicular Energy Trading Scheme Using Decentralized Identifiers
    Kim, Myeonghyun; Park, Kisung; Park, Youngho Mathematics (Basel), 05/2024, Letnik: 12, Številka: 10
    Journal Article
    Recenzirano
    Odprti dostop

    As the usage of electric vehicles (EVs) expands, various energy management technologies, including battery energy storage systems, are being developed to efficiently charge EVs using various energy ...
Celotno besedilo
1 2 3 4 5
zadetkov: 127

Nalaganje filtrov