A taxonomy of challenges for self-sovereign identity systems
Creating and utilizing digital identities are fundamental steps towards accessing online
services. In order to facilitate the management of user identities, the concept of identity …
services. In order to facilitate the management of user identities, the concept of identity …
PT-SSIM: A proactive, trustworthy self-sovereign identity management system
Digital identity management (DIM) systems have become challenging, especially, given the
current progression in ubiquitous environments enclosing cooperative Internet of Things …
current progression in ubiquitous environments enclosing cooperative Internet of Things …
Decentralized identity with applications to security and privacy for the internet of things
Decentralized Identity (dID) has brought to the forefront the advantages and importance of
total user control over identity. Previous solutions delegate identity management to the …
total user control over identity. Previous solutions delegate identity management to the …
[PDF][PDF] The Impact of Self-Sovereign Identities on CyberSecurity
In this study, it was aimed to examine the effects that can be seen in eliminating the security
vulnerabilities encountered in the cyber security domain with the use of self-sovereign …
vulnerabilities encountered in the cyber security domain with the use of self-sovereign …
FutureDID: A Fully Decentralized Identity System with Multi-Party Verification
Decentralized identity (DID) systems conforming to the World Wide Web Consortium (W3C)
Decentralized Identifiers (DIDs) and Verifiable Credentials Data Model recommendations …
Decentralized Identifiers (DIDs) and Verifiable Credentials Data Model recommendations …
TrustVault: A privacy-first data wallet for the European Blockchain Services Infrastructure
S Jacobino, J Pouwelse - arxiv preprint arxiv:2210.02987, 2022 - arxiv.org
The European Union is on course to introduce a European Digital Identity that will be
available to all EU citizens and businesses. This will have a huge impact on how citizens …
available to all EU citizens and businesses. This will have a huge impact on how citizens …
CRSet: Non-Interactive Verifiable Credential Revocation with Metadata Privacy for Issuers and Everyone Else
Like any digital certificate, Verifiable Credentials (VCs) require a way to revoke them in case
of an error or key compromise. Existing solutions for VC revocation, most prominently …
of an error or key compromise. Existing solutions for VC revocation, most prominently …
Combining Verifiable Credentials and Blockchain Tokens for Traceable and Offline Token Operations
S Chenna, C Prehofer - 2023 IEEE 9th World Forum on Internet …, 2023 - ieeexplore.ieee.org
As data becomes an integral part of various industries, it introduces new challenges in the
increasingly connected environment. This gives rise to the necessity for new data sharing …
increasingly connected environment. This gives rise to the necessity for new data sharing …
Enhancing Security in User-Centered Authentication Using KERI
In the context of the widespread adoption of user-centric authentication methods,
safeguarding the confidentiality of private keys during the exchange of credentials has …
safeguarding the confidentiality of private keys during the exchange of credentials has …
Unstoppable DAOs for web3 disruption
Decentralised Autonomous Organisations (DAOs) have the capability of being a disruptive
Web3 technology. Their usage of cryptographically secure distributed ledgers shows …
Web3 technology. Their usage of cryptographically secure distributed ledgers shows …