{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:49:20Z","timestamp":1742942960146,"version":"3.40.3"},"publisher-location":"Cham","reference-count":56,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031603907"},{"type":"electronic","value":"9783031603914"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-60391-4_9","type":"book-chapter","created":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T07:01:47Z","timestamp":1718607707000},"page":"128-145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Bitcoin-Based Digital Identity Model for\u00a0the\u00a0Internet of\u00a0Things"],"prefix":"10.1007","author":[{"given":"Youakim","family":"Badr","sequence":"first","affiliation":[]},{"given":"Xiaoyang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Samia","family":"Saad-Bouzefrane","sequence":"additional","affiliation":[]},{"given":"Soumya","family":"Banerjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,18]]},"reference":[{"key":"9_CR1","unstructured":"Telecommunication Standardization Sector, Overview of the Internet of things, ITU (2012). https:\/\/www.itu.int\/rec\/T-REC-Y.2060-201206-I. Accessed 20 Jan 2021"},{"key":"9_CR2","unstructured":"IDC, The Growth in Connected IoT Devices Is Expected to Generate 79.4ZB of Data in 2025, 2019, https:\/\/www.idc.com\/getdoc.jsp?containerId=prUS45213219, Access 13 Feb 2021"},{"key":"9_CR3","unstructured":"Telecommunication Standardization Sector, NGN Identity Management Framework, ITU, 2009, https:\/\/www.itu.int\/rec\/T-REC-Y.2720-200901-I access 23 Jan 2021"},{"key":"9_CR4","unstructured":"Bertino, E., Takahashi, K.: Identity Management: Concepts, Technologies, and Systems, Artech House (2011)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Recordon, D., Reed, D.: OpenID 2.0: A Platform for User-centric Identity Management, Proceedings of the Second ACM Workshop on Digital Identity Management (2006)","DOI":"10.1145\/1179529.1179532"},{"key":"9_CR6","unstructured":"Security Services Technical Committee of OASIS, Security Assertion Markup Language (SAML) v2.0, Available at http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=security (2005)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Cantor, S., Scavo, T.: Shibboleth Architecture, Protocols and Profiles (2005)","DOI":"10.26869\/TI.66.1"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Torres, J., Nogueira, M., Pujolle, G.: A Survey on Identity Management for the Future Network, IEEE Communications Surveys (2013)","DOI":"10.1109\/SURV.2012.072412.00129"},{"key":"9_CR9","volume-title":"The Identity Crisis Security","author":"G Alpar","year":"2011","unstructured":"Alpar, G., Hoepman, J., Siljee, J.: The Identity Crisis Security. Privacy and Usability Issues in Identity Management, CoRR (2011)"},{"key":"9_CR10","unstructured":"Nakamoto, S.: Bitcoin: a Peer-to-Peer Electronic Cash System. 2008. [Online]. Available: https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"9_CR11","unstructured":"J\u00f8sang, A., Pope, S.: User Centric Identity Management, AusCERT Conference (2005)"},{"key":"9_CR12","unstructured":"J\u00f8sang, A., Zomai, M., Suriadi, S.: Usability and Privacy in Identity Management Architectures, Australian Computer Society Inc (2007)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Maler, E., Reed, D.: The Venn of identity: Options and issues in federated identity management, IEEE Security & Privacy (2008)","DOI":"10.1109\/MSP.2008.50"},{"key":"9_CR14","first-page":"177","volume-title":"An entity-centric approach for privacy and identity management in cloud computing, 29th IEEE Symposium on Reliable Distributed Systems (SRDS\u201910)","author":"P Angin","year":"2010","unstructured":"Angin, P., et al.: An entity-centric approach for privacy and identity management in cloud computing, 29th IEEE Symposium on Reliable Distributed Systems (SRDS\u201910), pp. 177\u2013183. New Delhi, India (2010)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Suriadi, S., Foo, E.: A. J\u00f8sang A User-centric Federated Single Sign-on System. J. Netw. Comput. Appl. 32, 388\u2013401 (2009)","DOI":"10.1016\/j.jnca.2008.02.016"},{"key":"9_CR16","unstructured":"PRIMELife, Privacy and Identity Management in Europe for Life, Available online: http:\/\/primelife.ercim.eu, Access Feb 2021"},{"key":"9_CR17","unstructured":"SWIFT, Secure Widespread Identities for Federated Telecommunications, Available online: https:\/\/www.swift.com, Access Feb 2021"},{"key":"9_CR18","unstructured":"DAIDALOS, Designing Advanced Network Interfaces for the Delivery and Administration of Location Independent, Optimised Personal Services, Available online: https:\/\/www.tssg.org\/projects\/daidalos\/, Access Feb 2021"},{"key":"9_CR19","unstructured":"Kantara, Available online: http:\/\/kantarainitiative.org, Access Jan 2021"},{"key":"9_CR20","unstructured":"Liberty, The Liberty Alliance project, Available online: http:\/\/www.projectliberty.org, Access Jan 2021"},{"key":"9_CR21","unstructured":"FIDIS, Future of Identity in the Information Society, Available online: http:\/\/www.fidis.net, Access Jan 2021"},{"key":"9_CR22","unstructured":"Higgins, Higgins - open source identity framework, Available online: http:\/\/www.eclipse.org\/higgins, Access Nov 2020"},{"key":"9_CR23","unstructured":"STORK, Secure idenTity acrOss boRders linKed, Available online: https:\/\/www.eid-stork.eu, Access Jan 2021"},{"key":"9_CR24","unstructured":"PICOS, Privacy and Identity Management for Community Services, Available online: http:\/\/www.picos-project.eu, Access Jan 2021"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Zhu, X., Badr, Y.: Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions , Sensors 2018, 18, 4215","DOI":"10.3390\/s18124215"},{"key":"9_CR26","unstructured":"Bertocci, V., Serack, G., Baker, C.: Understanding Windows Cardspace: An Introduction to the Concepts and Challenges of Digital Identities, Addison Wesley Professional (2007)"},{"key":"9_CR27","unstructured":"Namecoin. Namecoin: The First Solution to Zooko\u2019s Triangle, Available online: https:\/\/namecoin.org, Access Jan 2021"},{"key":"9_CR28","unstructured":"Fromknecht, C., Dragos, V., Sophia, Y.: CertCoin: A NameCoin Based Decentralized Authentication System 6.857 Class Project (2014)"},{"key":"9_CR29","unstructured":"Leiding, B., Cap, CH., Mundt, T., Samaneh, R.: Authcoin: Validation and Authentication in Decentralized Networks, arXiv preprint arXiv:1609.04955 (2016)"},{"key":"9_CR30","unstructured":"Muneeb, A., Nelson, J., Shea, R., Freedman, M.: Blockstack: A Global Naming and Storage System Secured by Blockchains. In USENIX Annual Technical Conference, pp. 181\u2013194 (2016)"},{"key":"9_CR31","unstructured":"Mustafa, A.: \"SCPKI: A Smart Contract-based PKI and Identity System.\" In Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, pp. 35\u201340. ACM (2017)"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Liu, Y., Zhao, Z.. Guo, G., Wang, X., Tan, Z., Wang, S.: An Identity Management System Based on Blockchain (2017)","DOI":"10.1109\/PST.2017.00016"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Augot, D., Chabanne, H., Cl\u00e9mot, O., George, W.: Transforming face-to-face identity proofing into anonymous digital identity using the Bitcoin blockchain. arXiv preprint arXiv:1710.02951 (2017)","DOI":"10.1109\/PST.2017.00014"},{"key":"9_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-319-67816-0_22","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"Daniel Augot","year":"2017","unstructured":"Augot, Daniel, Chabanne, Herv\u00e9, Chenevier, Thomas, George, William, Lambert, Laurent: A user-centric system for verified identities on the bitcoin blockchain. In: Garcia-Alfaro, Joaquin, Navarro-Arribas, Guillermo, Hartenstein, Hannes, Herrera-Joancomart\u00ed, Jordi (eds.) ESORICS\/DPM\/CBT - 2017. LNCS, vol. 10436, pp. 390\u2013407. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67816-0_22"},{"key":"9_CR35","unstructured":"Hardjono, T., Sandy Pentland, A.: \"Verifiable Anonymous Identities and Access Control in Permissioned Blockchains.\""},{"key":"9_CR36","doi-asserted-by":"crossref","unstructured":"Halpin, H.: \"NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging.\" In Proceedings of the 12th International Conference on Availability, Reliability and Security, p. 92. ACM (2017)","DOI":"10.1145\/3098954.3104056"},{"key":"9_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-319-67816-0_21","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"Sarah Azouvi","year":"2017","unstructured":"Azouvi, Sarah, Al-Bassam, Mustafa, Meiklejohn, Sarah: Who am i? Secure identity registration on distributed ledgers. In: Garcia-Alfaro, Joaquin, Navarro-Arribas, Guillermo, Hartenstein, Hannes, Herrera-Joancomart\u00ed, Jordi (eds.) ESORICS\/DPM\/CBT -2017. LNCS, vol. 10436, pp. 373\u2013389. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67816-0_21"},{"key":"9_CR38","doi-asserted-by":"crossref","unstructured":"Gao, Z., et al.: \"Blockchain-based identity management with mobile device.\" In Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, pp. 66\u201370 (2018)","DOI":"10.1145\/3211933.3211945"},{"key":"9_CR39","doi-asserted-by":"publisher","first-page":"2274","DOI":"10.1109\/ACCESS.2017.2782733","volume":"6","author":"J Lee","year":"2018","unstructured":"Lee, J.: BIDaaS: blockchain based ID as a service. IEEE Access 6, 2274\u20132278 (2018)","journal-title":"IEEE Access"},{"key":"9_CR40","doi-asserted-by":"crossref","unstructured":"Faber, B., et al.: BPDIMS: A Blockchain-Based Personal Data and Identity Management System. Proceedings of the 52nd Hawaii International Conference on System Sciences (2019)","DOI":"10.24251\/HICSS.2019.821"},{"issue":"15","key":"9_CR41","doi-asserted-by":"publisher","first-page":"2953","DOI":"10.3390\/app9152953","volume":"9","author":"J Alsayed Kassem","year":"2019","unstructured":"Alsayed Kassem, J., Sayeed, S., Marco-Gisbert, H., Pervez, Z., Dahal, K.: DNS-IdM: a blockchain identity management system to secure personal data sharing in a network. Appl. Sci. 9(15), 2953 (2019)","journal-title":"Appl. Sci."},{"key":"9_CR42","doi-asserted-by":"crossref","unstructured":"Borse, Y., et al.: Anonymity: a secure identity management using smart contracts. Available at SSRN 3352370 (2019)","DOI":"10.2139\/ssrn.3352370"},{"key":"9_CR43","doi-asserted-by":"crossref","unstructured":"Hong, S., Kim, H. VaultPoint: a blockchain-based SSI model that complies with OAuth 2.0. Electronics, 9(8), 1231","DOI":"10.3390\/electronics9081231"},{"key":"9_CR44","doi-asserted-by":"crossref","unstructured":"Lin, C., He, D., Huang, X., Kumar, N., Choo, K.K.R.: BCPPA: a blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems (2020)","DOI":"10.1109\/TITS.2020.3002096"},{"key":"9_CR45","unstructured":"Uport. A scalable DID method for Ethereum addresses enabling them to collect on-chain and off-chain data, Available online: https:\/\/www.uport.me, Access Feb 2021"},{"key":"9_CR46","unstructured":"Sovrin Foundation. Personally manage your digital IDs online with the Sovrin Network - an open source project creating a global public utility for self-sovereign identity. Available online: https:\/\/sovrin.org, Access Feb, 2021"},{"key":"9_CR47","unstructured":"Shocard. Secure Enterprise Identity Authentication, Available online: https:\/\/shocard.com\/ access Feb 2021"},{"key":"9_CR48","unstructured":"Bitnation. Governance 2.0, Available online: https:\/\/bitnation.co\/, Access Feb 2021"},{"key":"9_CR49","unstructured":"Civic. Secure Identity Ecosystem-Decentralized Identity Reusable KYC, Available online: https:\/\/www.civic.com\/, Access Feb 2021"},{"key":"9_CR50","unstructured":"Jolocom. Decentralized Infrastructure for Self-Sovereign Identity, Available online: http:\/\/jolocom.io\/, Access Feb 2021"},{"key":"9_CR51","unstructured":"Allen, C., et al.: Decentralized Public Key Infrastructure, https:\/\/danubetech.com\/download\/dpki.pdf, Access Feb 2021"},{"key":"9_CR52","unstructured":"Koblitz, N.: CM-curves with good cryptographic properties, Proc. Crypto\u201991, Springer-Verlag (1992)"},{"key":"9_CR53","unstructured":"Standards for Efficient Cryptography, SEC 2: Recommended Elliptic Curve Domain Parameters January 27 (2010) http:\/\/www.secg.org\/sec2-v2.pdf"},{"key":"9_CR54","unstructured":"Antonopoulos, A.M.: Mastering Bitcoin: unlocking digital cryptocurrencies, O\u2019Reilly Media (2014)"},{"key":"9_CR55","doi-asserted-by":"crossref","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication,\" in Proc. of the RSLA \u201989, pp.233\u2013271 (1989)","DOI":"10.1145\/74850.74852"},{"key":"9_CR56","unstructured":"Ethereum Community, A Next-Generation Smart Contract and Decentralized Application Platform, https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper, Access 20 Jan 2018"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-60391-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T07:03:51Z","timestamp":1718607831000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-60391-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031603907","9783031603914"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-60391-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"18 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISTP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Information Security Theory and Practice","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 February 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wistp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wistp2024.roc.cnam.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}