{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T00:23:35Z","timestamp":1768263815624,"version":"3.49.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,14]]},"DOI":"10.1109\/ic3i56241.2022.10072845","type":"proceedings-article","created":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T17:34:44Z","timestamp":1679506484000},"page":"2179-2183","source":"Crossref","is-referenced-by-count":6,"title":["Administration of Digital Identities Using Blockchain"],"prefix":"10.1109","author":[{"given":"Shipra Ravi","family":"Kumar","sequence":"first","affiliation":[{"name":"Jaypee Institute of Information Technology,Department of Computer Science Engineering and Information Technology,Noida,India"}]},{"given":"Mukta","family":"Goyal","sequence":"additional","affiliation":[{"name":"Jaypee Institute of Information Technology,Department of Computer Science Engineering and Information Technology,Noida,India"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Centrify survey results","volume-title":"Tech. rep., Centrify","year":"2014"},{"key":"ref2","article-title":"2018 identity fraud","author":"Pascual","year":"2018","journal-title":"Fraud enters a new era of complexity"},{"key":"ref3","article-title":"White paper: Identity management verified using the blockchain","volume-title":"Tech. rep., ShoCard, Inc","author":"ShoCard","year":"2017"},{"key":"ref4","article-title":"White paper: 2017 cybercrime report","volume-title":"Tech. rep., Herjavec Group","volume":"22","author":"Morgan","year":"2017"},{"key":"ref5","article-title":"Bitcoin","author":"Nakamoto","year":"2008","journal-title":"A peer-to-peer electronic cash system"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"ref7","article-title":"A comprehensive literature review on the blockchain technology as an technological enabler for innovation","volume-title":"Tech. rep","author":"Johansen","year":"2017"},{"key":"ref8","article-title":"Blockchain: Blueprint for a new economy","author":"Swan","year":"2015","journal-title":"O\u2019Reilly Media, Inc."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0163477"},{"key":"ref10","article-title":"Blockchain challenges and opportunities: A survey","author":"Zheng","year":"2016","journal-title":"Work Pap.\u20132016"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref15","article-title":"Self-sovereign identity","author":"Abraham","year":"2017"},{"key":"ref16","article-title":"Bitcoin and quantum computing","author":"Tessler","year":"2017","journal-title":"arXiv preprintarXiv: 1711.04235"},{"issue":"3","key":"ref17","first-page":"26","article-title":"Digital identity and the blockchain: universal identity management and the concept of the \u201cSelf-Sovereign\u201d individual","volume":"28","author":"AJ","year":"May","journal-title":"Frontiers in Blockchain"},{"key":"ref18","article-title":"Towards a Blockchain based digital identity verification, record attestation and record sharing system","author":"Aydar","year":"2019","journal-title":"arXiv preprint arXiv:1906.09791"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/iciem54221.2022.9853052"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/iciem54221.2022.9853062"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/iciem54221.2022.9853192"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/iciem54221.2022.9853125"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-6684-3921-0.ch007"}],"event":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","location":"Uttar Pradesh, India","start":{"date-parts":[[2022,12,14]]},"end":{"date-parts":[[2022,12,16]]}},"container-title":["2022 5th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10072015\/10072297\/10072845.pdf?arnumber=10072845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T14:54:45Z","timestamp":1707836085000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10072845\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ic3i56241.2022.10072845","relation":{},"subject":[],"published":{"date-parts":[[2022,12,14]]}}}