Efficient Certification of Endpoint Control on Blockchain
Proving that an <italic>endpoint</italic> (e.g. URL, telephone number, etc.) is controlled by a <italic>subject</italic> is crucial in many applications. In the web, this is witnessed by the widespread adoption of HTTPS. In centralized architectures, this task is usually carr...
Main Authors: | Diego Pennino, Maurizio Pizzonia, Andrea Vitaletti, Marco Zecchini |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2021-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9547272/ |
Similar Items
-
Blockchain and Self Sovereign Identity to Support Quality in the Food Supply Chain
by: Luisanna Cocco, et al.
Published: (2021-11-01) -
Decentralized and Self-Sovereign Identity: Systematic Mapping Study
by: Spela Cucko, et al.
Published: (2021-01-01) -
A Systematic Literature Mapping on Using Blockchain Technology in Identity Management
by: T. T. Tram Ngo, et al.
Published: (2023-01-01) -
VaultPoint: A Blockchain-Based SSI Model that Complies with OAuth 2.0
by: Seongho Hong, et al.
Published: (2020-07-01) -
Analysis of Revocation Mechanisms for Blockchain Applications and a Proposed Model Based in Self-Sovereign Identity
by: Fernando Richter Vidal, et al.
Published: (2022-06-01)