2017 IEEE Symposium on Privacy-Aware Computing (PAC) 2017
DOI: 10.1109/pac.2017.28
|View full text |Cite
|
Sign up to set email alerts
|

Poster: Towards Fully Distributed User Authentication with Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 2 publications
0
10
0
Order By: Relevance
“…Table I depicts the four categories of these methods based on the taxonomy. L. Zhang et al [15] proposed a general purpose framework that stores user's identity in the blockchain and exploits a smart contract for managing different permissions based on user's related data for different websites. This method consists of four main actors (i.e.…”
Section: Authentication Methodsmentioning
confidence: 99%
“…Table I depicts the four categories of these methods based on the taxonomy. L. Zhang et al [15] proposed a general purpose framework that stores user's identity in the blockchain and exploits a smart contract for managing different permissions based on user's related data for different websites. This method consists of four main actors (i.e.…”
Section: Authentication Methodsmentioning
confidence: 99%
“…The basic assumptions considered in the electricity supply model are given in Table 2 In addition to the above, Table 3 provides the various input parameters employed in this study model which include power generation capacity of each generation method, installed generation capacity, the amount of fuel consumed, electricity generated alongside fixed and variable costs as well as efficiency, availability in percentages, lifetime, and merit order for the base year (2017). [21][22][23] It is pertinent to mention that the electricity generation in 2017 was 94.8 TWh which is just 6% of projected electricity generation (2374 TWh) in 2055.…”
Section: Key Assumptionsmentioning
confidence: 99%
“…Lewison and Corella [20]proposed a certificate-based PKI authentication system based on the Ethereum blockchain, which solves the problems of excessive communication in traditional PKI certificate management and the use of CRLs. Zhang et al [21] solved the centralization problem of the traditional PKI system by using blockchain technology. In their framework, users store their identities on the blockchain and attach a smart contract to grant different permissions for each site or application, thereby enabling an entirely distributed user authentication framework.…”
Section: A Related Workmentioning
confidence: 99%