1. Tom, Barbereau., Balázs, Bodó. (2023). Beyond financial regulation of crypto-asset wallet software: In search of secondary liability. Computer Law & Security Review, 49:105829-105829. doi: 10.1016/j.clsr.2023.105829

  2. Team, P. (2023, October 23). Secure Multi-Party Computation (MPC): A Deep Dive. Panther Protocol Blog.

  3. MacDonald. R (2022, August 19). Blockchain and passwordless authentication: Mitigating future cyberattacks with blockchain enabled. CIO AXIS.

  4. Smit, A. (2020). Identity Reboot: Reimagining Data Privacy for the 21st Century. MintBit Ltd

  5. Omar Hasan, Lionel Brunie, and Elisa Bertino. 2022. Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey. ACM Comput. Surv. 55, 2, Article 32 (February 2023), 37 pages.

  6. Guskow Cardoso, A. (2023). Decentralized Autonomous Organizations - DAOs: the Convergence of Technology, Law, Governance, and Behavioral Economics. MIT Computational Law Report. Retrieved from

  7. Schiener, D. (2018, June 20). Liquid Democracy: True democracy for the 21st century. Medium.

  8. Moffat, S. (2021). Consumer Identity & Access Management: Design Fundamentals. Independently published

  9. Law, A. W., Clinical Professor of Law at Benjamin N. Cardozo School of. (2021). The Rise of Decentralized Autonomous Organizations: Opportunities and Challenges. Stanford Journal of Blockchain Law & Policy. Retrieved from

  10. Nyman-Metcalf, K. and Repytskyi, T. (2016). Exporting Good Governance Via e-Governance:

  11. Habib, G., Sharma, S., Ibrahim, S., Ahmad, I., Qureshi, S., & Ishfaq, M. (2022). Blockchain Technology: Benefits, Challenges, Applications, and Integration of Blockchain Technology with Cloud Computing. Future Internet, 14(11), 341.

  12. DappRadar. (2024). Top Blockchains - DappRadar. Retrieved from"

  13. Yildiz, H., Küpper, A., Thatmann, D., Göndör, S., & Herbke, P. (2022, August 8). A Tutorial on the Interoperability of Self-sovereign Identities. arXiv:2208.04692 [cs.SE]. Retrieved from

  14. Reed D, Sporny M, Longley D, Allen C, Grant R, Sabadello M, Holt J (2021) Decentralized identifiers (dids) v1.0: Core architecture, data model, and representations., Accessed 25 May 2021

  15. Enge, A., Satybaldy, A., & Nowostawski, M. (2022). An offline mobile access control system based on self-sovereign identity standards. Computer Networks, 219, 109434.

Last updated