References

  1. Tom, Barbereau., Balázs, Bodó. (2023). Beyond financial regulation of crypto-asset wallet software: In search of secondary liability. Computer Law & Security Review, 49:105829-105829. doi: 10.1016/j.clsr.2023.105829

  2. Team, P. (2023, October 23). Secure Multi-Party Computation (MPC): A Deep Dive. Panther Protocol Blog. https://blog.pantherprotocol.io/a-deep-dive-into-secure-multi-party-computation-mpc/

  3. MacDonald. R (2022, August 19). Blockchain and passwordless authentication: Mitigating future cyberattacks with blockchain enabled. CIO AXIS. https://www.cioaxis.com/hottopics/security/blockchain-and-passwordless-authentication-mitigating-future-cyberattacks-with-blockchain-enabled-passwordless-authentication

  4. Smit, A. (2020). Identity Reboot: Reimagining Data Privacy for the 21st Century. MintBit Ltd

  5. Omar Hasan, Lionel Brunie, and Elisa Bertino. 2022. Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey. ACM Comput. Surv. 55, 2, Article 32 (February 2023), 37 pages. https://doi.org/10.1145/3490236

  6. Guskow Cardoso, A. (2023). Decentralized Autonomous Organizations - DAOs: the Convergence of Technology, Law, Governance, and Behavioral Economics. MIT Computational Law Report. Retrieved from https://law.mit.edu/pub/decentralizedautonomousorganizations

  7. Schiener, D. (2018, June 20). Liquid Democracy: True democracy for the 21st century. Medium. https://medium.com/organizer-sandbox/liquid-democracy-true-democracy-for-the-21st-century

  8. Moffat, S. (2021). Consumer Identity & Access Management: Design Fundamentals. Independently published

  9. Law, A. W., Clinical Professor of Law at Benjamin N. Cardozo School of. (2021). The Rise of Decentralized Autonomous Organizations: Opportunities and Challenges. Stanford Journal of Blockchain Law & Policy. Retrieved from https://stanford-jblp.pubpub.org/pub/rise-of-daos

  10. Nyman-Metcalf, K. and Repytskyi, T. (2016). Exporting Good Governance Via e-Governance:

  11. Habib, G., Sharma, S., Ibrahim, S., Ahmad, I., Qureshi, S., & Ishfaq, M. (2022). Blockchain Technology: Benefits, Challenges, Applications, and Integration of Blockchain Technology with Cloud Computing. Future Internet, 14(11), 341.

  12. DappRadar. (2024). Top Blockchains - DappRadar. Retrieved from https://dappradar.com/rankings/chains?sort=transactionCount&order=desc&range=all"

  13. Yildiz, H., Küpper, A., Thatmann, D., Göndör, S., & Herbke, P. (2022, August 8). A Tutorial on the Interoperability of Self-sovereign Identities. arXiv:2208.04692 [cs.SE]. Retrieved from https://arxiv.org/abs/2208.04692

  14. Reed D, Sporny M, Longley D, Allen C, Grant R, Sabadello M, Holt J (2021) Decentralized identifiers (dids) v1.0: Core architecture, data model, and representations. https://www.w3.org/TR/did-core/, Accessed 25 May 2021

  15. Enge, A., Satybaldy, A., & Nowostawski, M. (2022). An offline mobile access control system based on self-sovereign identity standards. Computer Networks, 219, 109434.

Last updated