2020
DOI: 10.1109/tvt.2020.2986041
|View full text |Cite
|
Sign up to set email alerts
|

An Identity Management and Authentication Scheme Based on Redactable Blockchain for Mobile Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
54
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 107 publications
(55 citation statements)
references
References 29 publications
0
54
0
1
Order By: Relevance
“…In recent years, many scholars have devoted themselves to the research in this area and have put forward many effective methods and models. From the perspective of social capital theory, Greiner emphasized the problem of information asymmetry in P2P online loan transactions and pointed out that due to the virtual nature of the network, the problem of information asymmetry between borrowers and investors in the P2P loan model is more prone to problems [6]. Puro constructed a logistic regression model, based on the borrower's credit rating, loan amount and interest rate, to predict the borrower's likelihood of completing the loan [7].…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, many scholars have devoted themselves to the research in this area and have put forward many effective methods and models. From the perspective of social capital theory, Greiner emphasized the problem of information asymmetry in P2P online loan transactions and pointed out that due to the virtual nature of the network, the problem of information asymmetry between borrowers and investors in the P2P loan model is more prone to problems [6]. Puro constructed a logistic regression model, based on the borrower's credit rating, loan amount and interest rate, to predict the borrower's likelihood of completing the loan [7].…”
Section: Introductionmentioning
confidence: 99%
“…Existing research (e.g., [74,[76][77][78]) on decentralized identity management investigated the use of DLT for the mutual authentication of X-Nodes and controlling their identifying information. Previous work (e.g., [74,76]) on the authentication of X-Nodes used permissioned distributed ledgers and smart contracts (i.e., agreements that are formalized in program code and deployed to the distributed ledger).…”
Section: Comparison With Related Workmentioning
confidence: 99%
“…In the network-acquisition phase, electronic equipment is used to detect human body-related information, and then, various networks are used to transmit the detected data to realize automatic data collection and upload [6]. Neil Zhao used acceleration as a relevant parameter to analyze the characteristics of walking or running [7]. The scholar plotted the relationship between each phase of the walking cycle and the changes in vertical and forward acceleration.…”
Section: Introductionmentioning
confidence: 99%