{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:17Z","timestamp":1750220597168,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,21]],"date-time":"2020-09-21T00:00:00Z","timestamp":1600646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,25]]},"DOI":"10.1145\/3410699.3413790","type":"proceedings-article","created":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T04:05:29Z","timestamp":1599192329000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Decentralized robinson list"],"prefix":"10.1145","author":[{"given":"Albenzio","family":"Cirillo","sequence":"first","affiliation":[{"name":"Fondazione Ugo Bordoni"}]},{"given":"Antonio","family":"Mauro","sequence":"additional","affiliation":[{"name":"Fondazione Ugo Bordoni"}]},{"given":"Diego","family":"Pennino","sequence":"additional","affiliation":[{"name":"Roma Tre University"}]},{"given":"Maurizio","family":"Pizzonia","sequence":"additional","affiliation":[{"name":"Roma Tre University"}]},{"given":"Andrea","family":"Vitaletti","sequence":"additional","affiliation":[{"name":"Sapienza University of Rome"}]},{"given":"Marco","family":"Zecchini","sequence":"additional","affiliation":[{"name":"Sapienza University of Rome"}]}],"member":"320","published-online":{"date-parts":[[2020,9,21]]},"reference":[{"volume-title":"Last accessed","year":"2020","key":"e_1_3_2_1_1_1","unstructured":"35+ phone spam statistics for 2017, 2018 , 2019 n. https:\/\/www.comparitech.com\/blog\/information-security\/phone-spam-statistics\/ , Last accessed April 2020 . 35+ phone spam statistics for 2017, 2018, 2019 n. https:\/\/www.comparitech.com\/blog\/information-security\/phone-spam-statistics\/, Last accessed April 2020."},{"key":"e_1_3_2_1_2_1","volume-title":"Last accessed","author":"Federal Communications Commissions","year":"2020","unstructured":"Federal Communications Commissions top unwanted robocalls and texts. https:\/\/www.fcc.gov\/consumers\/guides\/stop-unwanted-robocalls-and-texts , Last accessed February 2020 . Federal Communications Commissionstop unwanted robocalls and texts. https:\/\/www.fcc.gov\/consumers\/guides\/stop-unwanted-robocalls-and-texts, Last accessed February 2020."},{"key":"e_1_3_2_1_3_1","volume-title":"http:\/\/www.undp.org\/content\/seoul_policy_center\/en\/home\/presscenter\/articles\/2019\/flattening-the-curve-on-covid-19.html,Last accessed","author":"Economy ROK","year":"2020","unstructured":"ROK Ministry of Economy and Financeflattening the curve on covid-19. http:\/\/www.undp.org\/content\/seoul_policy_center\/en\/home\/presscenter\/articles\/2019\/flattening-the-curve-on-covid-19.html,Last accessed April 2020 . ROK Ministry of Economy and Financeflattening the curve on covid-19. http:\/\/www.undp.org\/content\/seoul_policy_center\/en\/home\/presscenter\/articles\/2019\/flattening-the-curve-on-covid-19.html,Last accessed April 2020."},{"key":"e_1_3_2_1_4_1","volume-title":"February","author":"American Association for Public Opinion Research.","year":"2018","unstructured":"American Association for Public Opinion Research. Spam flagging and call blocking and its impact on survey research , February 2018 . American Association for Public Opinion Research. Spam flagging and call blocking and its impact on survey research, February 2018."},{"key":"e_1_3_2_1_5_1","volume-title":"Last accessed","author":"Registro","year":"2020","unstructured":"Registro pubblico delle opposizioni. http:\/\/www.registrodelleopposizioni.it\/en , Last accessed April 2020 . Registro pubblico delle opposizioni. http:\/\/www.registrodelleopposizioni.it\/en, Last accessed April 2020."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39632-1_8"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41431-019-0560-9"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2018.00073"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_10_1","first-page":"300","volume-title":"International Conference on Security for Information Technology and Communications","author":"Rantos Konstantinos","year":"2018","unstructured":"Konstantinos Rantos , George Drosatos , Konstantinos Demertzis , Christos Ilioudis , Alexandros Papanikolaou , and Antonios Kritsas . Advocate : a consent management platform for personal data processing in the iot using blockchain technology . In International Conference on Security for Information Technology and Communications , pages 300 -- 313 . Springer , 2018 . Konstantinos Rantos, George Drosatos, Konstantinos Demertzis, Christos Ilioudis, Alexandros Papanikolaou, and Antonios Kritsas. Advocate: a consent management platform for personal data processing in the iot using blockchain technology. In International Conference on Security for Information Technology and Communications, pages 300--313. Springer, 2018."},{"volume-title":"Technical report","year":"1994","key":"e_1_3_2_1_11_1","unstructured":"Iso\/iec 24760:2019 it security and privacy --- a framework for identity management. Technical report , New York , 1994 . Iso\/iec 24760:2019 it security and privacy --- a framework for identity management. Technical report, New York, 1994."},{"key":"e_1_3_2_1_12_1","unstructured":"European Union. eIDAS - Electronic Identification Authentication and Trust Services EU Regulation 910\/2014.  European Union. eIDAS - Electronic Identification Authentication and Trust Services EU Regulation 910\/2014."},{"issue":"80","key":"e_1_3_2_1_13_1","first-page":"86","article-title":"A survey on essential components of a self-sovereign identity","volume":"30","author":"M\u00fchle Alexander","year":"2018","unstructured":"Alexander M\u00fchle , Andreas Gr\u00fcner , Tatiana Gayvoronskaya , and Christoph Meinel . A survey on essential components of a self-sovereign identity . Computer Science Review , 30 : 80 -- 86 , 2018 . Alexander M\u00fchle, Andreas Gr\u00fcner, Tatiana Gayvoronskaya, and Christoph Meinel. A survey on essential components of a self-sovereign identity. Computer Science Review, 30:80 -- 86, 2018.","journal-title":"Computer Science Review"},{"key":"e_1_3_2_1_14_1","volume-title":"W3C Decentralized Identifiers (DIDs) v1.0","author":"Reed D","year":"2017","unstructured":"D Reed and M Sporny . W3C Decentralized Identifiers (DIDs) v1.0 , 2017 . D Reed and M Sporny. W3C Decentralized Identifiers (DIDs) v1.0, 2017."},{"key":"e_1_3_2_1_15_1","volume-title":"W3C Verifiable Credentials Data Model 1.0: Expressing verifiable information on the web","author":"Sporny M","year":"2018","unstructured":"M Sporny , D Longley , and Chadwick D . W3C Verifiable Credentials Data Model 1.0: Expressing verifiable information on the web , 2018 . M Sporny, D Longley, and Chadwick D. W3C Verifiable Credentials Data Model 1.0: Expressing verifiable information on the web, 2018."},{"key":"e_1_3_2_1_16_1","volume-title":"Uport: A platform for self-sovereign identity. URL: https:\/\/whitepaper.uport.me\/uPort_whitepaper_DRAFT20170221.pdf","author":"Lundkvist Christian","year":"2017","unstructured":"Christian Lundkvist , Rouven Heck , Joel Torstensson , Zac Mitton , and Michael Sena . Uport: A platform for self-sovereign identity. URL: https:\/\/whitepaper.uport.me\/uPort_whitepaper_DRAFT20170221.pdf , 2017 . Christian Lundkvist, Rouven Heck, Joel Torstensson, Zac Mitton, and Michael Sena. Uport: A platform for self-sovereign identity. URL: https:\/\/whitepaper.uport.me\/uPort_whitepaper_DRAFT20170221.pdf, 2017."},{"key":"e_1_3_2_1_17_1","volume-title":"Last accessed","author":"Documentation Algorand Official","year":"2020","unstructured":"Algorand Official Documentation , exploring features: Assets. https:\/\/developer.algorand.org\/docs\/features\/asa\/ , Last accessed May 2020 . Algorand Official Documentation, exploring features: Assets. https:\/\/developer.algorand.org\/docs\/features\/asa\/, Last accessed May 2020."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_8"},{"key":"e_1_3_2_1_19_1","volume-title":"Last accessed","author":"Documentation Algorand Official","year":"2020","unstructured":"Algorand Official Documentation , exploring features: Atomic transfers. https:\/\/developer.algorand.org\/docs\/features\/atomic_transfers\/ , Last accessed May 2020 . Algorand Official Documentation, exploring features: Atomic transfers. https:\/\/developer.algorand.org\/docs\/features\/atomic_transfers\/, Last accessed May 2020."},{"key":"e_1_3_2_1_20_1","volume-title":"Last accessed","author":"Decentralized","year":"2020","unstructured":"Decentralized robinson list. https:\/\/amauro.gitlab.io\/fob_robinson_list\/ , Last accessed May 2020 . Decentralized robinson list. https:\/\/amauro.gitlab.io\/fob_robinson_list\/, Last accessed May 2020."},{"key":"e_1_3_2_1_21_1","volume-title":"Last accessed","author":"Algorand","year":"2020","unstructured":"Algorand : The first pure proof of stake blockchain platform. https:\/\/www.algorand.com\/ , Last accessed May 2020 . Algorand: The first pure proof of stake blockchain platform. https:\/\/www.algorand.com\/, Last accessed May 2020."},{"key":"e_1_3_2_1_22_1","volume-title":"NDSS","author":"Leung Derek","year":"2019","unstructured":"Derek Leung , Adam Suhl , Yossi Gilad , and Nickolai Zeldovich . Vault : Fast boot-strapping for the algorand cryptocurrency . In NDSS , 2019 . Derek Leung, Adam Suhl, Yossi Gilad, and Nickolai Zeldovich. Vault: Fast boot-strapping for the algorand cryptocurrency. In NDSS, 2019."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/3152676"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of 1st Workshop on Blockchain Theory and Applications (BRAIN 2020)","author":"Pennino Diego","year":"2020","unstructured":"Diego Pennino , Maurizio Pizzonia , Andrea Vitaletti , and Marco Zecchini . Binding of endpoints to identifiers by on-chain proofs . In Proceedings of 1st Workshop on Blockchain Theory and Applications (BRAIN 2020) , 2020 . To appear. Diego Pennino, Maurizio Pizzonia, Andrea Vitaletti, and Marco Zecchini. Binding of endpoints to identifiers by on-chain proofs. In Proceedings of 1st Workshop on Blockchain Theory and Applications (BRAIN 2020), 2020. To appear."}],"event":{"name":"MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"London United Kingdom","acronym":"MobiCom '20"},"container-title":["Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410699.3413790","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3410699.3413790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:55Z","timestamp":1750195915000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410699.3413790"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,21]]},"references-count":24,"alternative-id":["10.1145\/3410699.3413790","10.1145\/3410699"],"URL":"https:\/\/doi.org\/10.1145\/3410699.3413790","relation":{},"subject":[],"published":{"date-parts":[[2020,9,21]]},"assertion":[{"value":"2020-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}