References
- Melanie Swan, Blockchain, O'Reilly Media, Inc, pp. 10-25, 2015.
- S. Nakamoto, Bitcoin: APeer-to-Peer Electronic Cash System.https://bitcoin.org/bitcoin.pdf.
- D. Reed et al., Decentralized Identifiers (DIDs) v1.0, Core Data Model and Syntaxes,https://www.w3.org/TR/did-core/.
- W3C Credentials Community Group:https://www.w3.org/community/credentials/
- Y.A. Min, "A Study on Application of Blockchain Distributed ID Technology for Management of Welfare Dead Zone," Journal of the Institute of Internet, Broadcasting and Communication (JIIBC), Vol.20, No.6, pp. 145-150, Dec 2020. DOI : https://doi.org/10.7236/JIIBC.2020.20.6.145
- J.K. Hong et al., "Blockchain Watchdog: Real-time Blockchain Surveillance System Connecting Smart Contract Code and Distributed Storage," Journal of the Korean Institute of Internet, Broadcasting and Communication, Vol.20, No.4, PP.115-121, Oct 2020. DOI : https://doi.org/10.7236/JIIBC.2020.20.4.115
- M.H.Joo et al.,"De-identification policy and risk distribution framework for securing personal information," The International Journal of Government & Democracy in the Information Age, Vol. 23, No. 2, p195-219, 2018. DOI : 10.3233/IP-170057
- Liu, Kai-Cheng et al., "Optimized Data de-Identification Using Multidimensional k-Anonymity," in Proc. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp.1610-1614 Aug.1-3, 2018. DOI : 10.1109/Trust Com/BigDataSE.2018.00235
- H.J.Lee et al., "De-identification and Privacy Issues on Bigdata Transformation," in Proc. IEEE International Conference on Big Data and Smart Computing (BigComp), pp.514-519, Feb.19-22, 2020. DOI :10.1109/BigComp48618.2020.00-14
- Zhang. Zeyu, Lu. Zhiyang, Tian. Youliang, "Data Privacy Quantification and De-identification Model Based on Information Theory," in Proc. International Conference on Networking and Network Applications (NaNA) International Conference on, pp.213-222, Oct.10-13, 2019. DOI:10.1109/NaNA.2019.00046
- D. Abouakil, J. Heurix and T. Neubauer, "Data models for the pseudonymization of dicom data," in Proc. 44th Hawaii International Conference on System Sciencesm pp. 1-11, Feb 22. 2011. DOI : 10.1109/HICSS.2011.136
- Kaplun, Dmitriy I et al.,"Research and implementation of the algorithm for data de-identification for Internet of Things," in Proc. IEEE II International Conference on Control in Technical Systems (CTS), pp.363-366, Oct. 25-27, 2017. DOI : 10.1109/CTSYS.2017.8109568
- J.H. Lee et al., "Personal Information Management System with Blockchain Using zk-SNARK", The Journal of the Society for Information Security, Vol. 29, No. 2, pp. 299-308, April 2019. DOI : 10.13089/JKIISC.2019.29.2.299
- M.S. Kim and B.R.Kang, "Generalization of Zero-Knowledge Proof of Polynomial Equality", The Journal of the Korean Institute of Communication Sciences, Vol. 40, No. 5, pp.833-840, May 2015. UCI : G704-A00600.2015.40.5.012
- S.O. Kim, "Balance points for safe processing and rational use of pseudonym information-Combined with constitutional evaluation of the 3rd Data Act, " Korea Public Law Research. Vol. 49, No. 2, pp.371-407, Dec 2020. DOI : 10.38176/PublicLaw.2020.12.49.2.371
- J.Y. Chun, G.T. No, "Suggestions for Applications of Anonymous Data under the Revised Data Privacy Acts", Journal of the Korea Information Security Society, Vol. 30, No. 3, pp.503-512, Jun 2020. DOI : 10.13089/JKIISC.2020.30.3.503
- Young. Jeffrey A et al., "A Methodological Framework for Validating ZKP Authentication Process," in Proc. IEEE 17th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI , pp.37-43 Dec.14-16, 2020. DOI: 10.1109/HONET50430.2020.9322828