{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:12:21Z","timestamp":1767262341359,"version":"3.30.2"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1109\/iccp63557.2024.10792994","type":"proceedings-article","created":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T19:09:09Z","timestamp":1734462549000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Self-Sovereign Identity System Using Blockchain and Smart Contracts"],"prefix":"10.1109","author":[{"given":"Cosmin","family":"Candrea","sequence":"first","affiliation":[{"name":"Technical University of Cluj-Napoca,Computer Science Department,Cluj-Napoca,Romania"}]},{"given":"Dan","family":"Mitrea","sequence":"additional","affiliation":[{"name":"Technical University of Cluj-Napoca,Computer Science Department,Cluj-Napoca,Romania"}]},{"given":"Tudor","family":"Cioara","sequence":"additional","affiliation":[{"name":"Technical University of Cluj-Napoca,Computer Science Department,Cluj-Napoca,Romania"}]}],"member":"263","reference":[{"key":"ref1","first-page":"71","article-title":"Identity management of e-ID, privacy and security in Europe. A human rights view","volume":"13.2","author":"Paul","year":"2008","journal-title":"information security technical report"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2011.5971959"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1257\/jep.22.2.171"},{"journal-title":"Identity theft literature review","year":"2005","author":"Newman","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/c2015-0-00282-9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2018.10.002"},{"key":"ref7","article-title":"The path to self-sovereign identity","author":"Christopher","year":"2016","journal-title":"Life with Alacrity"},{"key":"ref8","first-page":"5782","article-title":"A systematic literature mapping on secure identity management using blockchain technology","volume":"34.8","author":"Tripti","year":"2022","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"ref9","first-page":"1779","article-title":"The transparency challenge of blockchain in organizations","volume":"32.3","author":"Johannes","year":"2022","journal-title":"Electronic Markets"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/ITU-WT.2017.8247004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8202"},{"key":"ref13","first-page":"305","article-title":"The law and legality of smart contracts","volume":"1","author":"Max","year":"2016","journal-title":"Geo. L. Tech. Rev."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2018.8494045"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"2901","DOI":"10.1007\/s12083-021-01127-0","article-title":"Blockchain smart contracts: Applications, challenges, and future trends","volume":"14","author":"Shafaq Naheed","year":"2021","journal-title":"Peer-to-peer Networking and Applications"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2200244"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3204274"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"122248","DOI":"10.1016\/j.techfore.2022.122248","article-title":"A review of the key challenges of non-fungible tokens","volume":"187","author":"Omar","year":"2023","journal-title":"Technological Forecasting and Social Change"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2022.3209804"},{"key":"ref20","article-title":"Non-fungible token (NFT): Overview, evaluation, opportunities and challenges","author":"Qin","year":"2021","journal-title":"arXiv preprint"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"2901","DOI":"10.1007\/s12083-021-01127-0","article-title":"Blockchain smart contracts: Applications, challenges, and future trends","volume":"14","author":"Shafaq Naheed","year":"2021","journal-title":"Peer-to-peer Networking and Applications"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IAECST54258.2021.9695553"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.28"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICITIS.2010.5689468"},{"key":"ref25","first-page":"364","article-title":"Digital identity matters","volume":"56.4","author":"Arthur","year":"2005","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2018.05.010"},{"key":"ref27","first-page":"2053951719855091","article-title":"Digital identity: Contemporary challenges for data protection, privacy and non- discrimination rights","volume":"6.2","author":"Ana","year":"2019","journal-title":"Big Data & Society"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/nca.2019.8935015"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/COMMNET.2019.8742375"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931173"},{"key":"ref31","first-page":"364","article-title":"Digital identity matters","volume":"56.4","author":"Arthur","year":"2005","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902501"},{"key":"ref33","first-page":"18","article-title":"The inevitable rise of self-sovereign identity","volume":"29","author":"Tobin","year":"2016","journal-title":"The Sovrin Foundation"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/LCN52139.2021.9525011"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/pst.2017.00016"},{"key":"ref36","first-page":"203","article-title":"Self-sovereign identity for healthcare using blockchain","volume":"81","author":"Mohammed","year":"2023","journal-title":"Materials Today: Proceedings"},{"key":"ref37","first-page":"100","article-title":"Blockchain-enabled decentralized identity management: The case of self-sovereign identity in public transportation","volume":"2.2","author":"Lukas","year":"2021","journal-title":"Blockchain: Research and Applications"},{"key":"ref38","article-title":"Self- sovereign identity opportunities and challenges for the digital revolution","author":"Der","year":"2017","journal-title":"arXiv preprint"}],"event":{"name":"2024 IEEE 20th International Conference on Intelligent Computer Communication and Processing (ICCP)","start":{"date-parts":[[2024,10,17]]},"location":"Cluj-Napoca, Romania","end":{"date-parts":[[2024,10,19]]}},"container-title":["2024 IEEE 20th International Conference on Intelligent Computer Communication and Processing (ICCP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10792975\/10792923\/10792994.pdf?arnumber=10792994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T07:21:21Z","timestamp":1734506481000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10792994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/iccp63557.2024.10792994","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]}}}