|
[1] W3C. (2018) A registry for decentralized identifier methods. [Online]. Available: https://w3c-ccg.github. io/did-method-registry/ [2] Z. Zheng, S. Xie, H.-N. Dai, and H. Wang, “Blockchain challenges and opportunities: A survey,” Work Pap.–2016, 2016. [3] J. P. Morgan. (2016) Quorum whitepaper, version 0.1. Last visited on 2018-06-03. [Online]. Available: https://github.com/jpmorganchase/quorum-docs/blob/master/Quorum%20Whitepaper%20v0.1.pdf [4] J. Morgan. (2018) Quorum: A permissioned implementation of ethereum supporting data privacy. [Online]. Available: https://github.com/jpmorganchase/quorum [5] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2009. [Online]. Available: http://www.bitcoin.org/bitcoin.pdf [6] Namecoin. (2011) Namecoin wiki. [Online]. Available: https://wiki.namecoin.org/index.php?title= Welcome [7] C. Lee. (2011) Litecoin github. [Online]. Available: https://github.com/litecoin-project/litecoin [8] E. Foundation. (2018) Ethereum’s white paper. Last visited on 2018-05-21. [Online]. Available: https://github.com/ethereum/wiki/wiki/White-Paper [9] R3. (2014) R3 website. [Online]. Available: https://www.r3.com/ [10] R. G. Brown, J. Carlyle, I. Grigg, and M. Hearn, “Corda: An introduction,” 2016. [11] S. Scala and R. McGrath, “Advantages and disadvantages of electronic data interchange an industry perspective,” Information & Management, vol. 25, no. 2, pp. 85 – 91, 1993. [Online]. Available: http://www.sciencedirect.com/science/article/pii/0378720693900504 [12] 賴國旺, “公文電子交換系統之資訊安全改善建議,” 檔案季刊, 2014. [13] C.-W. Wu, H.-L. Shan, W.-C. Wang, D.-M. Shieh, and M.-H. Chang, “E-government electronic certification servicesin taiwan,” 2001. [14] W. Foundation. (2018) Public key infrastructure. Last visited on 2018-05-21. [Online]. Available: https://en.wikipedia.org/wiki/Public_key_infrastructure [15] 賴國旺, “機關公文管理系統與全國共用公文電子交換系統整合介接技術,” 檔案季刊, 2017. [16] 黃彥棻. (2013) 政府電子公文系統被駭,主管單位竟企圖遮掩. [Online]. Available: https: //www.ithome.com.tw/node/80703 [17] N. I. of Standards and Technology. (1996) Electronic data interchange (edi) (fips pub 161-2). [Online]. Available: https://web.archive.org/web/20080511043940/https://www.itl.nist.gov/fipspubs/fip161-2.htm [18] ISO, “Electronic data interchange for administration, commerce and transport (edifact) – application level syntax rules,” Tech. Rep., 1988, iSO 9735:1988. [Online]. Available: https://www.iso.org/standard/ 17592.html [19] Microsoft. (2017) Edi standards support. [Online]. Available: https://docs.microsoft.com/en-US/biztalk/ core/edi-standards-support [20] V. B. J. C. D. D.-C. L. P. K. J. N. D. R. M. S. G. S. N. T. H. T. W. Christopher Allen, Arthur Brock. (2015) Decentralized public key infrastructure. [Online]. Available: https://github.com/WebOfTrustInfo/ rebooting-the-web-of-trust/blob/master/final-documents/dpki.pdf [21] W3C. (2018) Data model and syntaxes for decentralized identifiers (dids). [Online]. Available: https://w3c-ccg.github.io/did-spec/ [22] A. Bakre, N. Patil, and S. Gupta, “Implementing decentralized digital identity using blockchain,” International Journal of Engineering Technology Science and Research, vol. 4, no. 10, pp. 379–385, 2017. [23] Z. Diebold, “Self-sovereign identity using smart contracts on the ethereum blockchain,” 2017. [24] J. Benet, “Ipfs-content addressed, versioned, p2p file system,” arXiv preprint arXiv:1407.3561, 2014. [25] S.-H. C. J.-W. J. Moon-Yong Jung, Won-Suk Kim, “A blockchain-based id/ip mapping and user-friendly fog computing for hyper-connected iot architecture,” International Journal of Information Communication Technology and Digital Convergence, 2017. [26] J. R. Douceur, “The sybil attack,” in International workshop on peer-to-peer systems. Springer, 2002, pp. 251–260. [27] J. M. Gonzalez, M. Anwar, and J. B. Joshi, “A trust-based approach against ip-spoofing attacks,” in Privacy, Security and Trust (PST), 2011 Ninth Annual International Conference on. IEEE, 2011, pp. 63–70. [28] CCN. (2018) Bitcoin gold hit by double spend attack, exchanges lose millions. [Online]. Available: https://www.ccn.com/bitcoin-gold-hit-by-double-spend-attack-exchanges-lose-millions/ [29] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy-preserving smart contracts,” in 2016 IEEE symposium on security and privacy (SP). IEEE, 2016, pp. 839–858. [30] Microsoft. (2018) .net core. [Online]. Available: https://docs.microsoft.com/zh-tw/dotnet/core/ [31] Nethereum. (2018) Nethereum. [Online]. Available: https://github.com/Nethereum/Nethereum [32] Ethereum. (2018) Web3.js. [Online]. Available: https://github.com/ethereum/web3.js/ [33] Microsoft. (2017) Standard date and time format strings. [Online]. Available: https://docs.microsoft. com/en-US/dotnet/standard/base-types/standard-date-and-time-format-strings [34] D. Identity. (2018) Universal resolver. [Online]. Available: https://github.com/decentralized-identity/ universal-resolver |