{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:13:48Z","timestamp":1759133628400,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030639235"},{"type":"electronic","value":"9783030639242"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63924-2_1","type":"book-chapter","created":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T23:23:20Z","timestamp":1605828200000},"page":"3-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Blockchain Technology: Intrinsic Technological and Socio-Economic Barriers"],"prefix":"10.1007","author":[{"given":"Ahto","family":"Buldas","sequence":"first","affiliation":[]},{"given":"Dirk","family":"Draheim","sequence":"additional","affiliation":[]},{"given":"Takehiko","family":"Nagumo","sequence":"additional","affiliation":[]},{"given":"Anton","family":"Vedeshin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,19]]},"reference":[{"key":"1_CR1","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"1_CR2","first-page":"23","volume":"146","author":"O Williamson","year":"1998","unstructured":"Williamson, O.: Transaction cost economics: how it works; where it is headed. De Econ. 146, 23\u201358 (1998)","journal-title":"De Econ."},{"issue":"3","key":"1_CR3","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1504\/IJTPM.2005.008406","volume":"5","author":"J Koppenjan","year":"2005","unstructured":"Koppenjan, J., Groenewegen, J.: Institutional design for complex technological systems. Int. J. Technol. Policy Manag. 5(3), 240\u2013257 (2005)","journal-title":"Int. J. Technol. Policy Manag."},{"volume-title":"Bitcoin and Beyond: Cryptocurrencies","year":"2017","key":"1_CR4","unstructured":"Campbell-Verduyn, M. (ed.): Bitcoin and Beyond: Cryptocurrencies. Blockchains and Global Governance. Routledge, Abingdon (2017)"},{"issue":"12","key":"1_CR5","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/3132259","volume":"60","author":"A Narayanan","year":"2017","unstructured":"Narayanan, A., Clark, J.: Bitcoin\u2019s academic pedigree. Commun. ACM 60(12), 36\u201345 (2017)","journal-title":"Commun. ACM"},{"issue":"1","key":"1_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3183367","volume":"9","author":"J Mendling","year":"2018","unstructured":"Mendling, J., Weber, I., van der Aalst, W., et al.: Blockchains for business process management - challenges and opportunities. ACM Trans. Manag. Inf. Syst. 9(1), 1\u201316 (2018)","journal-title":"ACM Trans. Manag. Inf. Syst."},{"issue":"4","key":"1_CR7","doi-asserted-by":"publisher","first-page":"397","DOI":"10.3233\/IP-190154","volume":"24","author":"O Rikken","year":"2019","unstructured":"Rikken, O., Janssen, M., Kwee, Z.: Governance challenges of blockchain and decentralized autonomous organizations. Inf. Polity 24(4), 397\u2013417 (2019)","journal-title":"Inf. Polity"},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/j.ijinfomgt.2019.08.012","volume":"50","author":"M Janssen","year":"2020","unstructured":"Janssen, M., Weerakkody, V., Ismagilova, E., Sivarajah, U., Irani, Z.: A framework for analysing blockchain technology adoption: integrating institutional, market and technical factors. Int. J. Inf. Manag. 50, 302\u2013309 (2020)","journal-title":"Int. J. Inf. Manag."},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijinfomgt.2020.102120","volume":"54","author":"N Upadhyay","year":"2020","unstructured":"Upadhyay, N.: Demystifying blockchain: a critical analysis of challenges, applications and opportunities. Int. J. Inf. Manag. 54, 1\u201326 (2020)","journal-title":"Int. J. Inf. Manag."},{"key":"1_CR10","volume-title":"Token Economy - How the Web3 reinvents the Internet","author":"S Voshmgir","year":"2020","unstructured":"Voshmgir, S.: Token Economy - How the Web3 reinvents the Internet, 2nd edn. BlockchainHub Berlin, Berlin (2020)","edition":"2"},{"key":"1_CR11","volume-title":"Mastering Bitcoin: Programming the Open Blockchain","author":"AM Antonopoulos","year":"2017","unstructured":"Antonopoulos, A.M.: Mastering Bitcoin: Programming the Open Blockchain. O\u2019Reilly, Sebastopol (2017)"},{"key":"1_CR12","first-page":"285","volume-title":"The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance","author":"E Hughes","year":"1997","unstructured":"Hughes, E.: A cypherpunk\u2019s manifesto. In: Schneier, B., Banisar, D. (eds.) The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance, pp. 285\u2013287. Wiley, Hoboken (1997)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"DuPont, Q.: Experiments in algorithmic governance: a history and ethnography of \u201cThe DAO,\u201d a failed decentralized autonomous organization. In: Campbell-Verduyn, M. (ed.) Bitcoin and Beyond: Cryptocurrencies, Blockchains and Global Governance, pp. 1\u201318. Routledge (2017)","DOI":"10.4324\/9781315211909-8"},{"key":"1_CR14","volume-title":"Reengineering the Corporation","author":"M Hammer","year":"1993","unstructured":"Hammer, M., Champy, J.: Reengineering the Corporation. HarperCollins, New York (1993)"},{"key":"1_CR15","volume-title":"Organizational Culture and Leadership","author":"EH Schein","year":"2016","unstructured":"Schein, E.H.: Organizational Culture and Leadership. Wiley, Hoboken (2016)"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-030-27523-5_16","volume-title":"Electronic Government and the Information Systems Perspective","author":"S Lips","year":"2019","unstructured":"Lips, S., Aas, K., Pappel, I., Draheim, D.: Designing an effective long-term identity management strategy for a mature e-state. In: K\u0151, A., Francesconi, E., Anderst-Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) EGOVIS 2019. LNCS, vol. 11709, pp. 221\u2013234. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-27523-5_16"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Pappel, I., Pappel, I., Tepandi, J., Draheim, D.: Systematic digital signing in Estonian e-government processes - influencing factors, technologies, change management. Trans. Large Scale Data Knowl. Cent. Syst. 16 (2017)","DOI":"10.1007\/978-3-662-56266-6_2"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-319-70004-5_33","volume-title":"Future Data and Security Engineering","author":"V Tsap","year":"2017","unstructured":"Tsap, V., Pappel, I., Draheim, D.: Key success factors in introducing national e-identification systems. In: Dang, T.K., Wagner, R., K\u00fcng, J., Thoai, N., Takizawa, M., Neuhold, E.J. (eds.) FDSE 2017. LNCS, vol. 10646, pp. 455\u2013471. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70004-5_33"},{"key":"1_CR19","volume-title":"EDI: A Total Management Guide","author":"MA Emmelhainz","year":"1993","unstructured":"Emmelhainz, M.A.: EDI: A Total Management Guide. Van Nostrand Reinhold, New York (1993)"},{"key":"1_CR20","volume-title":"Estonia \u2013 The Digital Republic Secured by Blockchain","author":"P Martinson","year":"2019","unstructured":"Martinson, P.: Estonia \u2013 The Digital Republic Secured by Blockchain. PricewaterhouseCoopers, London (2019)"},{"key":"1_CR21","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-1-4613-9323-8_24","volume-title":"Sequences II","author":"D Bayer","year":"1993","unstructured":"Bayer, D., Haber, S., Stornetta, W.S.: Improving the efficiency and reliability of digital time-stamping. In: Capocelli, R., De Santis, A., Vaccaro, U. (eds.) Sequences II, pp. 329\u2013334. Springer, New York (1993). https:\/\/doi.org\/10.1007\/978-1-4613-9323-8_24"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the 1st IEEE Symposium on Security and Privacy, S&P 1980, p. 122 (1980)","DOI":"10.1109\/SP.1980.10006"},{"key":"1_CR23","unstructured":"Buldas, A., Saarepera, M.: Document verification with distributed calendar infrastructure. US Patent Application Publication No.: US 2013\/0276058 A1 (2013)"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-642-41488-6_21","volume-title":"Secure IT Systems","author":"A Buldas","year":"2013","unstructured":"Buldas, A., Kroonmaa, A., Laanoja, R.: Keyless signatures\u2019 infrastructure: how to build global distributed hash-trees. In: Riis Nielson, H., Gollmann, D. (eds.) NordSec 2013. LNCS, vol. 8208, pp. 313\u2013320. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41488-6_21"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Mota, C.: The rise of personal fabrication. In: Proceedings of the the 8th ACM Conference on Creativity and Cognition, C&C 2011, pp. 279\u2013288. ACM (2011)","DOI":"10.1145\/2069618.2069665"},{"issue":"5","key":"1_CR26","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1007\/s10845-015-1042-8","volume":"28","author":"F Tao","year":"2015","unstructured":"Tao, F., Cheng, Y., Zhang, L., Nee, A.Y.C.: Advanced manufacturing systems: socialization characteristics and trends. J. Intell. Manuf. 28(5), 1079\u20131094 (2015). https:\/\/doi.org\/10.1007\/s10845-015-1042-8","journal-title":"J. Intell. Manuf."},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Vedeshin, A., Dogru, J.M.U., Liiv, I., Draheim, D., Ben Yahia, S.: A digital ecosystem for personal manufacturing: an architecture for a cloud-based distributed manufacturing operating system. In: Proceedings of the 11th International Conference on Management of Digital EcoSystems, MEDES 2019, pp. 224\u2013228. ACM (2019)","DOI":"10.1145\/3297662.3365792"},{"key":"1_CR28","doi-asserted-by":"publisher","first-page":"40039","DOI":"10.1109\/ACCESS.2019.2946730","volume":"8","author":"A Vedeshin","year":"2019","unstructured":"Vedeshin, A., Dogru, J.M., Liiv, I., Ben Yahia, S., Draheim, D.: A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method. IEEE Access 8, 40039\u201340056 (2019)","journal-title":"IEEE Access"},{"key":"1_CR29","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-030-45183-7_6","volume-title":"Smart Applications and Data Analysis","author":"A Vedeshin","year":"2020","unstructured":"Vedeshin, A., Dogru, J.M.U., Liiv, I., Yahia, S.B., Draheim, D.: Smart cyber-physical system for pattern recognition of illegal 3D designs in 3D printing. In: Hamlich, M., Bellatreche, L., Mondal, A., Ordonez, C. (eds.) SADASC 2020. CCIS, vol. 1207, pp. 74\u201385. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45183-7_6"},{"key":"1_CR30","unstructured":"Brian Heater: Zap brings the manufacturing process to the cloud (2016). https:\/\/techcrunch.com\/2016\/09\/12\/zap\/"},{"key":"1_CR31","unstructured":"Isbj\u00f6rnssund, K., Vedeshin, A.: Secure streaming method in a numerically controlled manufacturing system, and a secure numerically controlled manufacturing system. U.S. Patent 2014111587 A3, 3 December 2015"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"3D Control Systems Inc.: 3DPrinterOS cloud world statistics (2020). https:\/\/cloud.3dprinteros.com\/dashboard\/#\/world-statistics","DOI":"10.18356\/da9808e5-en"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Barger, A., Bortnikov, V., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the 13th European Conference on Computer Systems, EuroSys 2018, pp. 1\u201315. ACM (2018)","DOI":"10.1145\/3190508.3190538"},{"key":"1_CR34","unstructured":"FinancesOnline: 47 Essential e-Signature Statistics: 2020 Market Share Analysis & Data (2020). https:\/\/financesonline.com\/25-essential-e-signature-statistics-analysis-of-trends-data-and-market-share\/"},{"key":"1_CR35","unstructured":"Everis: Study on the Use of Electronic Identification (eID) for the European Citizens\u2019 Initiative. Final Assessment Report. Everis, European Commission (2017)"},{"key":"1_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-030-27523-5_13","volume-title":"Electronic Government and the Information Systems Perspective","author":"V Tsap","year":"2019","unstructured":"Tsap, V., Pappel, I., Draheim, D.: Factors affecting e-ID public acceptance: a literature review. In: K\u0151, A., Francesconi, E., Anderst-Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) EGOVIS 2019. LNCS, vol. 11709, pp. 176\u2013188. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-27523-5_13"},{"key":"1_CR37","unstructured":"Cavallini, S., Bisogni, F., Gallozzi, D., Cozza, C., Aglietti, C.: Study on the supply-side of EU e-signature market: Final Study Report. Fondazione FORMIT, European Commission, Directorate-General Information Society and Media of the European Commission (2012)"},{"issue":"1","key":"1_CR38","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.ibusrev.2016.06.004","volume":"26","author":"L Alzahrani","year":"2017","unstructured":"Alzahrani, L., Al-Karaghouli, W., Weerakkody, V.: Analysing the critical factors influencing trust in e-government adoption from citizens\u2019 perspective: a systematic review and a conceptual framework. Int. Bus. Rev. 26(1), 164\u2013175 (2017)","journal-title":"Int. Bus. Rev."},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Carter, L., Liu, D.: Technology humanness, trust and e-government adoption. In: Proceedings of the 18th Australasian Conference on Information Systems, ACIS 2018. Association for Information Systems (2018)","DOI":"10.5130\/acis2018.cp"},{"key":"1_CR40","unstructured":"Agrello: Agrello ID - Identity based digital signatures (2020). https:\/\/www.agrello.id"},{"key":"1_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-030-24268-8_31","volume-title":"Artificial Intelligence and Security","author":"Yu Liu","year":"2019","unstructured":"Liu, Yu., Liu, T.: A novel threshold signature scheme based on elliptic curve with designated verifier. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICAIS 2019. LNCS, vol. 11635, pp. 332\u2013342. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-24268-8_31"},{"key":"1_CR42","unstructured":"The EU Parliament and the Council of the Eurpean Comission: Regulation (EU) No 910\/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/EC. Official Journal of the European Union L 257\/73 (2014)"},{"key":"1_CR43","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151, 1\u201332 (2014)","journal-title":"Ethereum Proj. Yellow Pap."},{"key":"1_CR44","unstructured":"Veriff: Veriff - identity verification done in seconds (2020). https:\/\/www.veriff.com. Accessed 05 Sept 2020"},{"key":"1_CR45","unstructured":"Thinnect: Thinnect - IoT Edge of Network Service Provider (2020). https:\/\/www.thinnect.com"}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63924-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T12:14:36Z","timestamp":1619266476000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-63924-2_1"}},"subtitle":["FDSE\u20192020 Keynote"],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030639235","9783030639242"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63924-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"19 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FDSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Data and Security Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quy Nhon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fdse2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.thefdse.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"161","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.5 avg. reviewers\/paper (for two submission rounds in total). LNCS 12466 includes 24 of the accepted papers and 2 invited keynotes. CCIS 1306 includes 29 full and 8 short of the accepted papers. The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}