83
Views
2
CrossRef citations to date
0
Altmetric
Articles

Empowering citizens by a blockchain-Based Robinson list

ORCID Icon, ORCID Icon, ORCID Icon, ORCID Icon, ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon show all
Pages 920-928 | Received 10 Jun 2021, Accepted 22 Sep 2021, Published online: 12 Oct 2021

References

  • Cirillo A, Mauro A, Pennino D, et al. Decentralized robinson list. Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems; CryBlock '20, Association for Computing Machinery; New York, NY: 2020. p. 1–6.
  • 35+ phone spam statistics for 2017, 2018, 2019. Available from: https://www.comparitech.com/blog/information-security/phone-spam-statistics/, Last accessed April 2020.
  • Federal Communications Commissionstop unwanted robocalls and texts. Available from: https://www.fcc.gov/consumers/guides/stop-unwanted-robocalls-and-texts, Last accessed February 2020.
  • ROK Ministry of Economy and Finance flattening the curve on covid-19. Available from: http://www.undp.org/content/seoul_policy_center/en/home/presscenter/articles/2019/flattening-the-curve-on-covid-19.html, Last accessed April 2020.
  • American Association for Public Opinion Research. Spam flagging and call blocking and its impact on survey research, February 2018.
  • Registro pubblico delle opposizioni. Available from: http://www.registrodelleopposizioni.it/en, Last accessed April 2020.
  • Voigt P, Von dem Bussche A. The EU general data protection regulation (GDPR). A Practical Guide, 1st ed. Cham: Springer International Publishing; 2017.
  • Kakarlapudi PV, Mahmoud QH. A systematic review of blockchain for consent management. Healthcare. 2021;9(2):137.
  • Tempest A. Robinson lists for efficient direct marketing. International Direct Marketing. Springer; 2007. p. 129–152.
  • Mamo N, Martin GM, Desira M, et al. Dwarna: a blockchain solution for dynamic consent in biobanking. European Journal of Human Genetics. 2019;28:1–18.
  • Bhaskaran K, Ilfrich P, Liffman D, et al. Double-blind consent-driven data sharing on blockchain. 2018 IEEE International Conference on Cloud Engineering (IC2E); IEEE; 2018. p. 385–391.
  • Androulaki E, Barger A, Bortnikov V, et al. Hyperledger fabric: a distributed operating system for permissioned blockchains. Proceedings of the Thirteenth EuroSys Conference; 2018. p. 1–15.
  • Rantos K, Drosatos G, Demertzis K, et al. Advocate: a consent management platform for personal data processing in the iot using blockchain technology. International Conference on Security for Information Technology and Communications; Springer; 2018. p. 300–313.
  • Sharma G, Kalra S. Advanced multi-factor user authentication scheme for e-governance applications in smart cities. Int J Computers Appl. 2019;41(4):312–327.
  • Ametepe W, Wang C, Ocansey SK, et al. Data provenance collection and security in a distributed environment: a survey. Int J Computers Appl. 2021;43(1):11–25.
  • Vaithyasubramanian S, Lalitha D, Kirubhashankar CK. Enhancing website security against bots, spam and web attacks using lcaptcha. Int J Computers Appl. 2019: 1–7.
  • Sun N, Lin G, Qiu J, et al. Near real-time twitter spam detection with machine learning techniques. Int J Computers Appl. 2020;1–11.
  • Iso/iec 24760:2019 it security and privacy-a framework for identity management. New York, 1994. Technical Report.
  • Mühle A, Grüner A, Gayvoronskaya T, et al. A survey on essential components of a self-sovereign identity. Computer Sci Rev. 2018;30:80–86.
  • Xiao Y, Zhang N, Lou W, et al. A survey of distributed consensus protocols for blockchain networks. IEEE Commun Surveys & Tutorials. 2020;22(2):1432–1465.
  • Tamassia R. Authenticated data structures. European symposium on algorithms; p. 2–5. Springer; 2003.
  • Algorand Official Documentation, exploring features: Assets. Available from: https://developer.algorand.org/docs/features/asa/, Last accessed May 2020.
  • Victor F, Lüders BK. Measuring ethereum-based ERC20 token networks. International Conference on Financial Cryptography and Data Security; Springer; 2019. p. 113–129.
  • Pynacl – public key encryption. Available from: https://pynacl.readthedocs.io/en/latest/public/, Last accessed May 2020.
  • Bernstein DJ. Cryptography in nacl. Networking and Cryptography Library. 2009;3:385.
  • Langley A, Hamburg M, Turner S. Elliptic Curves for Security. RFC 7748, January 2016.
  • Decentralized robinson list. Available from: https://gitlab.com/amauro/fob_robinson_list/-/tree/journal_version, Last accessed May 2021.
  • Algorand: The first pure proof of stake blockchain platform. Available from: https://www.algorand.com/, Last accessed May 2020.
  • Ethereum wiki project. On sharding blockchains. Available from: https://eth.wiki/sharding/Sharding-FAQs [Accessed 5 May 2021].
  • Monte GD, Pennino D, Pizzonia M. Scaling blockchains without giving up decentralization and security: A solution to the blockchain scalability trilemma. Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, CryBlock '20; New York, NY: Association for Computing Machinery; 2020. p. 71–76.
  • Micali S, Chen J. Algorand: A secure and efficient distributed ledger. Theoretical Computer Science. Vol. 777, 2019, P. 155–183.
  • Algorand Official Documentation: exploring features: Accounts. Available from: https://developer.algorand.org/docs/features/accounts/create/, Last accessed May 2021.
  • Pennino D, Pizzonia M, Vitaletti A, et al. Binding of endpoints to identifiers by on-chain proofs. 2020 IEEE Symposium on Computers and Communications (ISCC); 2020. p. 1–6.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.