{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T13:01:44Z","timestamp":1770987704026,"version":"3.50.1"},"reference-count":45,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T00:00:00Z","timestamp":1686960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Horizon Europe Research &amp; Innovation Programme","award":["101092612"],"award-info":[{"award-number":["101092612"]}]},{"name":"Horizon Europe Research &amp; Innovation Programme","award":["INVEST\/2022\/342"],"award-info":[{"award-number":["INVEST\/2022\/342"]}]},{"name":"Regional Department of Innovation, Universities, Science and Digital Society of the Generalitat Valenciana \u201cPrograma Investigo\u201d","award":["101092612"],"award-info":[{"award-number":["101092612"]}]},{"name":"Regional Department of Innovation, Universities, Science and Digital Society of the Generalitat Valenciana \u201cPrograma Investigo\u201d","award":["INVEST\/2022\/342"],"award-info":[{"award-number":["INVEST\/2022\/342"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>The popularity of blockchain technology stems largely from its association with cryptocurrencies, but its potential applications extend beyond this. Fungible tokens, which are interchangeable, can facilitate value transactions, while smart contracts using non-fungible tokens enable the exchange of digital assets. Utilizing blockchain technology, tokenized platforms can create virtual markets that operate without the need for a central authority. In principle, blockchain technology provides these markets with a high degree of security, trustworthiness, and dependability. This article surveys recent developments in these areas, including examples of architectures, designs, challenges, and best practices (case studies) for the design and implementation of tokenized platforms for exchanging digital assets.<\/jats:p>","DOI":"10.3390\/info14060347","type":"journal-article","created":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T02:29:19Z","timestamp":1687141759000},"page":"347","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Tokenized Markets Using Blockchain Technology: Exploring Recent Developments and Opportunities"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1392-1776","authenticated-orcid":false,"given":"Angel A.","family":"Juan","sequence":"first","affiliation":[{"name":"Center for Research in Production Management and Engineering, Universitat Polit\u00e8cnica de Val\u00e8ncia, 03801 Alcoy, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9221-7623","authenticated-orcid":false,"given":"Elena","family":"Perez-Bernabeu","sequence":"additional","affiliation":[{"name":"Center for Research in Production Management and Engineering, Universitat Polit\u00e8cnica de Val\u00e8ncia, 03801 Alcoy, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8031-6555","authenticated-orcid":false,"given":"Yuda","family":"Li","sequence":"additional","affiliation":[{"name":"Center for Research in Production Management and Engineering, Universitat Polit\u00e8cnica de Val\u00e8ncia, 03801 Alcoy, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4182-0120","authenticated-orcid":false,"given":"Xabier A.","family":"Martin","sequence":"additional","affiliation":[{"name":"Center for Research in Production Management and Engineering, Universitat Polit\u00e8cnica de Val\u00e8ncia, 03801 Alcoy, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6118-0389","authenticated-orcid":false,"given":"Majsa","family":"Ammouriova","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Multimedia and Telecommunication, Universitat Oberta de Catalunya, 08018 Barcelona, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9834-3599","authenticated-orcid":false,"given":"Barry B.","family":"Barrios","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Multimedia and Telecommunication, Universitat Oberta de Catalunya, 08018 Barcelona, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2023,6,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MCSE.2017.3421554","article-title":"What is the blockchain?","volume":"19","year":"2017","journal-title":"Comput. Sci. Eng."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","article-title":"Blockchain challenges and opportunities: A survey","volume":"14","author":"Zheng","year":"2018","journal-title":"Int. J. Web Grid Serv."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"117134","DOI":"10.1109\/ACCESS.2019.2936094","article-title":"A survey of blockchain from the perspectives of applications, challenges, and opportunities","volume":"7","author":"Monrat","year":"2019","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"121073","DOI":"10.1016\/j.techfore.2021.121073","article-title":"Ownership, uses and perceptions of cryptocurrency: Results from a population survey","volume":"173","author":"Steinmetz","year":"2021","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1002\/jcaf.22432","article-title":"Asset tokenization in plain English","volume":"31","author":"Sazandrishvili","year":"2020","journal-title":"J. Corp. Account. Financ."},{"key":"ref_6","unstructured":"Bala, R. (2022). Handbook on Blockchain, Springer."},{"key":"ref_7","unstructured":"Zheng, M., and Sandner, P. (2022). Blockchains and the Token Economy: Theory and Practice, Springer."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"105543","DOI":"10.1016\/j.clsr.2021.105543","article-title":"The digital tokenization of property rights. A comparative perspective","volume":"41","year":"2021","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1093\/ptj\/89.9.873","article-title":"Reprint\u2014Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement","volume":"89","author":"Moher","year":"2009","journal-title":"Phys. Ther."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1038\/44565","article-title":"Learning the parts of objects by non-negative matrix factorization","volume":"401","author":"Lee","year":"1999","journal-title":"Nature"},{"key":"ref_11","unstructured":"Heines, R., Dick, C., Pohle, C., and Jung, R. (2021, January 12\u201314). The Tokenization of Everything: Towards a Framework for Understanding the Potentials of Tokenized Assets. Proceedings of the PACIS, Virtual."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"100069","DOI":"10.1016\/j.bcra.2022.100069","article-title":"Tokenomics and blockchain tokens: A design-oriented morphological framework","volume":"3","author":"Freni","year":"2022","journal-title":"Blockchain Res. Appl."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Guggenberger, T., Schellinger, B., von Wachter, V., and Urbach, N. (2023). Kickstarting blockchain: Designing blockchain-based tokens for equity crowdfunding. Electron. Commer. Res., 1\u201335.","DOI":"10.1007\/s10660-022-09634-9"},{"key":"ref_14","unstructured":"Warren, J., and Marz, N. (2015). Big Data: Principles and Best Practices of Scalable Realtime Data Systems, Simon and Schuster."},{"key":"ref_15","unstructured":"Van Steen, M., and Tanenbaum, A.S. (2017). Distributed Systems, Maarten van Steen."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"7597686","DOI":"10.1155\/2018\/7597686","article-title":"Towards distributed data management in fog computing","volume":"2018","author":"Moysiadis","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1186\/s40537-020-00388-5","article-title":"A comprehensive performance analysis of Apache Hadoop and Apache Spark for large scale data sets using HiBench","volume":"7","author":"Ahmed","year":"2020","journal-title":"J. Big Data"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Scerri, S., Tuikka, T., de Vallejo, I.L., and Curry, E. (2022). Common European Data Spaces: Challenges and Opportunities. Data Spaces Des. Deploy. Future Dir., 337\u2013357.","DOI":"10.1007\/978-3-030-98636-0_16"},{"key":"ref_19","unstructured":"European Commission (2018). Towards a Common European Data Space, European Commission."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"100539","DOI":"10.1016\/j.gfj.2020.100539","article-title":"Tokenization of sukuk: Ethereum case study","volume":"51","author":"Khan","year":"2022","journal-title":"Glob. Financ. J."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"012040","DOI":"10.1088\/1757-899X\/1218\/1\/012040","article-title":"Towards Inclusive and Sustainable Infrastructure Development through Blockchain-enabled Asset Tokenization: An Exploratory Case Study","volume":"1218","author":"Tian","year":"2022","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Zarifis, A., and Cheng, X. (J. Electron. Bus. Digit. Econ., 2022). The business models of NFTs and fan tokens and how they build trust, J. Electron. Bus. Digit. Econ., ahead-of-print.","DOI":"10.1108\/JEBDE-07-2022-0021"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1002\/bse.3195","article-title":"The link between sustainable business models and Blockchain: A multiple case study approach","volume":"32","author":"Calandra","year":"2022","journal-title":"Bus. Strategy Environ."},{"key":"ref_24","unstructured":"Benedetti, H., and Rodr\u00edguez-Garnica, G. (2023). The Emerald Handbook on Cryptoassets: Investment Opportunities and Challenges, Emerald Publishing Limited."},{"key":"ref_25","first-page":"274","article-title":"Towards the Tokenization of Business Process Models using the Blockchain Technology and Smart Contracts","volume":"3137","author":"Kopp","year":"2022","journal-title":"CMIS"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"77284","DOI":"10.1109\/ACCESS.2022.3192837","article-title":"An ultra-scalable blockchain platform for universal asset tokenization: Design and implementation","volume":"10","author":"Buldas","year":"2022","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.future.2019.12.020","article-title":"A Blockchain Tokenizer for Industrial IOT trustless applications","volume":"105","author":"Mazzei","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2014.04.012","article-title":"False alarm minimization techniques in signature-based intrusion detection systems: A survey","volume":"49","author":"Hubballi","year":"2014","journal-title":"Comput. Commun."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","article-title":"A survey of data mining and machine learning methods for cyber security intrusion detection","volume":"18","author":"Buczak","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Shaukat, K., Luo, S., Chen, S., and Liu, D. (2020, January 12\u201313). Cyber threat detection using machine learning techniques: A performance evaluation perspective. Proceedings of the 2020 International Conference on Cyber Warfare and Security (ICCWS), Norfolk, VA, USA.","DOI":"10.1109\/ICCWS48432.2020.9292388"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Apruzzese, G., Colajanni, M., Ferretti, L., Guido, A., and Marchetti, M. (June, January 29). On the effectiveness of machine and deep learning for cyber security. Proceedings of the 2018 10th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia.","DOI":"10.23919\/CYCON.2018.8405026"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Miller, S.T., and Busby-Earle, C. (2017, January 13\u201316). Multi-perspective machine learning a classifier ensemble method for intrusion detection. Proceedings of the 2017 International Conference on Machine Learning and Soft Computing, Ho Chi Minh City, Vietnam.","DOI":"10.1145\/3036290.3036303"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/s00500-014-1511-6","article-title":"Evaluation of machine learning classifiers for mobile malware detection","volume":"20","author":"Narudin","year":"2016","journal-title":"Soft Comput."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3255","DOI":"10.1007\/s10462-019-09762-z","article-title":"An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm","volume":"53","author":"Somu","year":"2020","journal-title":"Artif. Intell. Rev."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Ghanem, K., Aparicio-Navarro, F.J., Kyriakopoulos, K.G., Lambotharan, S., and Chambers, J.A. (2017, January 6\u20137). Support vector machine for network intrusion and cyber-attack detection. Proceedings of the 2017 Sensor Signal Processing for Defence Conference (SSPD), London, UK.","DOI":"10.1109\/SSPD.2017.8233268"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1016\/j.eswa.2011.07.032","article-title":"An efficient intrusion detection system based on support vector machines and gradually feature removal method","volume":"39","author":"Li","year":"2012","journal-title":"Expert Syst. Appl."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"8873639","DOI":"10.1155\/2020\/8873639","article-title":"Spam detection approach for secure mobile message communication using machine learning algorithms","volume":"2020","author":"GuangJun","year":"2020","journal-title":"Secur. Commun. Netw."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.knosys.2015.01.009","article-title":"CANN: An intrusion detection system based on combining cluster centers and nearest neighbors","volume":"78","author":"Lin","year":"2015","journal-title":"Knowl.-Based Syst."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"3883","DOI":"10.1002\/sec.1307","article-title":"Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection","volume":"8","author":"Meng","year":"2015","journal-title":"Secur. Commun. Netw."},{"key":"ref_40","first-page":"5","article-title":"Intrusion detection using a novel hybrid method incorporating an improved KNN","volume":"173","author":"Shapoorifard","year":"2017","journal-title":"Int. J. Comput. Appl."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3372823","article-title":"The ai-based cyber threat landscape: A survey","volume":"53","author":"Kaloudi","year":"2020","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"2823","DOI":"10.1007\/s13042-018-00906-1","article-title":"Machine learning techniques applied to cybersecurity","volume":"10","year":"2019","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1186\/s40537-020-00318-5","article-title":"Cybersecurity data science: An overview from machine learning perspective","volume":"7","author":"Sarker","year":"2020","journal-title":"J. Big Data"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Delic, A.J., and Delfabbro, P.H. (2022). Profiling the Potential Risks and Benefits of Emerging \u201cPlay to Earn\u201d Games: A Qualitative Analysis of Players\u2019 Experiences with Axie Infinity. Int. J. Ment. Health Addict., 1\u201314.","DOI":"10.1007\/s11469-022-00894-y"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1085587","DOI":"10.3389\/fpsyg.2023.1085587","article-title":"How does platform\u2019s fintech level affect its word of mouth from the perspective of user psychology?","volume":"14","author":"Li","year":"2023","journal-title":"Front. Psychol."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/14\/6\/347\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:55:34Z","timestamp":1760126134000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/14\/6\/347"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,17]]},"references-count":45,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["info14060347"],"URL":"https:\/\/doi.org\/10.3390\/info14060347","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,17]]}}}