References
- S. Chatterjee, A. K. Kar, Y. K. Dwivedi, and H. Kizgin, H, "Prevention of cybercrimes in smart cities of India: from a citizen's perspective," Information Technology & People, Vol. 32, No. 5, pp. 1153-1183, 2019. https://doi.org/10.1108/ITP-05-2018-0251
- A. S. Elmaghraby and M. M. Losavio, "Cyber security challenges in Smart Cities: Safety, security and privacy," Journal of Advanced Research, Vol. 5, No. 4, pp. 491-497, 2014. https://doi.org/10.1016/j. jare.2014.02.006.
- A. Angelogianni, I. Politis, and C. Xenakis, "How many FIDO protocols are needed? Surveying the design, security and market perspectives," arXiv preprint, 2021. Available: https://arxiv.org/abs/2107.00577 107.00577
- NIST Big Data Public Working Group, "NIST Big Data Interoperability Framework: Volume 4, Security and Privacy Version 3," National Institute of Standards and Technology, 2019. https://doi.org/10.6028/NIST.SP.1500-4r2
- Z. Xihua and S. Goyal, "Security and privacy challenges using IoT-blockchain technology in a smart city: critical analysis," Int. J. Electr. Electron. Res, Vol. 10, No. 2, pp. 190-195, 2022. https://doi.org/10.37391/ijeer.100224
- M. A. Lopez, "Self-Sovereign Identity: The Future of Identity: Self-Sovereignty, Digital Wallets, and Blockchain," IDB, 2021. http://dx.doi.org/10.18235/0002635
- M. Swan, Blockchain: Blueprint for a New Economy, O'Reilly Media, Inc, 2015.
- G. Wood, "Ethereum: A secure decentralised generalised transaction ledger," Ethereum project yellow paper, Vol. 151, No. 2014, pp. 1-32, 2014.
- D. H. Sin & J. H. Lee, "Smart contract security for Pin Tech," KIPS Review, Vol. 22, No. 5, pp.54-62, 2015.
- S. S. Kushwaha, S. Joshi, D. Singh, M. Kaur, and H. N. Lee, "Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract," IEEE Access, 2021. doi: 10.1109/ACCESS.2021.3140091.
- https://www.mdpi.com/2071-1050/11/24/7054
- A. Rajalakshmi, K. V. Lakshmy, M. Sindu, and P. P. Amritha, "A Blockchain and IPFS based framework for secure research record keeping," International Journal of Pure and Applied Mathematics, Vol. 119, No. 15, pp. 1437-1442, 2018.
- I. Permatasari, M. Essaid, H. Kim, and H. Ju, "Blockchain implementation to verify archives integrity on cilegon E-archive," Applied Sciences, Vol. 10, No. 7, 2621, 2020. http://doi.org/10.3390.app1007261 https://doi.org/10.3390.app1007261
- J. Sun, X. Yao, S. Wang, and Y. Wu, "Blockchain-based secure storage and access scheme for electronic medical records in IPFS," IEEE access, Vol. 8, pp. 59389-59401, 2020. https://doi.org/10.1109/ACCESS.2020.2982964
- T. Nishide, K. Yoneyama, and K. Ohta, "Attribute-based encryption with partially hidden encryptor-specified access structures," in Applied Crypytography and Network Security, Springer, pp. 111-129, 2008.
- A. Mosteiro-Sanchez, M. Barcelo, J. Astorga, and A. Urbieta, "A. Trustworthy users: Using IOTA and IPFS for attribute validation in CP-ABE and dCP-ABE schemes," Smart Cities, Vol.6, No.2, pp. 913-928, 2023. https://doi.org/10.3390/smartcities6020044