review-article Open Access
- Authors:
- Surbhi Sharma Department of Computer Science and Engineering Netaji Subhas University of Technology (formerly NSIT) New Delhi India
Department of Computer Science and Engineering Netaji Subhas University of Technology (formerly NSIT) New Delhi India
https://orcid.org/0000-0002-2288-2687
Search about this author
- Rudresh Dwivedi Department of Computer Science and Engineering Netaji Subhas University of Technology (formerly NSIT) New Delhi India
Department of Computer Science and Engineering Netaji Subhas University of Technology (formerly NSIT) New Delhi India
Search about this author
IET BlockchainVolume 4Issue 2June 2024pp 124–151https://doi.org/10.1049/blc2.12063
Published:01 February 2024Publication History
- 0citation
- 0
- Downloads
Metrics
Total Citations0Total Downloads0Last 12 Months0
Last 6 weeks0
- Get Citation Alerts
New Citation Alert added!
This alert has been successfully added and will be sent to:
You will be notified whenever a record that you have chosen has been cited.
To manage your alert preferences, click on the button below.
Manage my Alerts
New Citation Alert!
Please log in to your account
- Publisher Site
IET Blockchain
Volume 4, Issue 2
PreviousArticleNextArticle
Abstract
Abstract
Blockchain technology has become an emerging area in recent years due to its capacity to improve the security, dependability, and resilience of distributed systems. Research based on this technique has impacted several firms, including banking, healthcare, data processing, remote sensing, and many others. The key characteristics of blockchain technology that make it appealing are data immutability, transparency, privacy, decentralization, and distributed ledgers. However, there is a chance of a privacy breach with sensitive biometric data. The purpose of this investigation is to examine blockchain‐based biometric applications research. It begins by determining the myriad ways that biometrics and blockchain may work together, including the storage and protection of biometric templates, identity management, and biometric authentication systems. Different biometric applications with respect to blockchain technology are also identified, along with the types of biometric data taken into account, features and capabilities of blockchain technology exploited, and blockchain technology frameworks employed. Finally, the authors seek to investigate blockchain concepts in the biometric domain by evaluating their pros and cons and summarizing the methods developed on blockchain for diverse biometric applications. Additionally, the applications of blockchain‐based biometric systems are highlighted before moving on to open research questions and potential future researchareas.
The purpose of this work is to investigate blockchain‐based biometric applications to benefit the government, people, and businesses boosting the level of privacy and security. Blockchain properties can enhance conventional biometric systems for the storage and protection of biometric templates, identity management, and biometric authentication systems.
REFERENCES
- 1 Nakamoto S.: Bitcoin: a peer‐to‐peer electronic cash system. https://bitcoin.org/bitcoin.pdf (2008)Google Scholar
- 2 Christidis K., Devetsikiotis M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)Google Scholar
Cross Ref
- 3 Conoscenti M., Vetro A., De‐Martin J.C.: Blockchain for the internet of things: a systematic literature review. In: 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), pp.1–6. IEEE, Piscataway, NJ (2016)Google Scholar
- 4 Aggarwal S., Chaudhary R., Aujla G.S., Jindal A., Dua A., Kumar N.: Energychain: Enabling energy trading for smart homes using blockchains in smart grid ecosystem. In: Proceedings of the 1st ACM MobiHoc Workshop on Networking and Cybersecurity for Smart Cities, pp.1–6. ACM, New York (2018)Google Scholar
- 5 Magnani A., Calderoni L., Palmieri P.: Feather forking as a positive force: incentivising green energy production in a blockchain‐based smart grid. In: Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, pp.99–104. ACM, New York (2018)Google Scholar
- 6 Gordon W.J., Catalini C.: Blockchain technology for healthcare: facilitating the transition to patient‐driven interoperability. Comput. Struct. Biotechnol. J. 16, 224–230 (2018)Google Scholar
Cross Ref
- 7 De‐Aguiar E.J., Faiçal B.S., Krishnamachari B., Ueyama J.: A survey of blockchain‐based strategies for healthcare. ACM Comput. Surv. (CSUR) 53(2), 1–27 (2020)Google Scholar
- 8 Drosatos G., Kaldoudi E.: Blockchain applications in the biomedical domain: a scoping review. Comput. Struct. Biotechnol. J. 17, 229–240 (2019)Google Scholar
- 9 Alammary A., Alhazmi S., Almasri M., Gillani S.: Blockchain‐based applications in education: a systematic review. Appl. Sci. 9(12), 2400 (2019)Google Scholar
- 10 Lu H., Huang K., Azimi M., Guo L.: Blockchain technology in the oil and gas industry: a review of applications, opportunities, challenges, and risks. IEEE Access 7, 41426–41444 (2019)Google Scholar
Cross Ref
- 11 Sharma P., Jindal R., Borah M.D.: Blockchain technology for cloud storage: a systematic literature review. ACM Comput. Surv. (CSUR) 53(4), 1–32 (2020)Google Scholar
Digital Library
- 12 Park J.H., Park J.H.: Blockchain security in cloud computing: use cases, challenges, and solutions. Symmetry 9(8), 164 (2017)Google Scholar
- 13 Batubara F.R., Ubacht J., Janssen M.: Challenges of blockchain technology adoption for e‐government: a systematic literature review. In: Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, pp.1–9. IEEE, Piscataway, NJ (2018)Google Scholar
- 14 Jain A.K., Nandakumar K., Ross A.: 50 years of biometric research: accomplishments, challenges, and opportunities. Pattern Recognit. Lett. 79, 80–105 (2016)Google Scholar
Digital Library
- 15 Dyson R.G.: Strategic development and SWOT analysis at the University of Warwick. Eur. J. Oper. Res. 152(3), 631–640 (2004)Google Scholar
Cross Ref
- 16 Ghafourian M., Sumer B., Vera‐Rodriguez R., Fierrez J., Tolosana R., Moralez A., etal.: Combining blockchain and biometrics: a survey on technical aspects and a first legal analysis. arXiv preprint arXiv:230210883 (2023)Google Scholar
- 17 Ali M.S., Vecchio M., Pincheira M., Dolui K., Antonelli F., Rehmani M.H.: Applications of blockchains in the internet of things: a comprehensive survey. IEEE Commun. Surv. Tutorials 21(2), 1676–1717 (2018)Google Scholar
Cross Ref
- 18 Hölbl M., Kompara M., Kamišalić A., Nemec‐Zlatolas L.: A systematic review of the use of blockchain in healthcare. Symmetry 10(10), 470 (2018)Google Scholar
Cross Ref
- 19 Makhdoom I., Abolhasan M., Abbas H., Ni W.: Blockchain's adoption in IoT: the challenges, and a way forward. J. Netw. Comput. Appl. 125, 251–279 (2019)Google Scholar
Cross Ref
- 20 Zheng Z., Xie S., Dai H.N., Chen X., Wang H.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352–375 (2018)Google Scholar
Cross Ref
- 21 Dinh T.T.A., Liu R., Zhang M., Chen G., Ooi B.C., Wang J.: Untangling blockchain: a data processing view of blockchain systems. IEEE Trans. Knowl. Data Eng. 30(7), 1366–1385 (2018)Google Scholar
Cross Ref
- 22 Tasca P., Tessone C.J.: Taxonomy of blockchain technologies: principles of identification and classification. arXiv preprint arXiv:170804872 (2017)Google Scholar
- 23 Zheng Z., Xie S., Dai H., Chen X., Wang H.: An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData congress), pp.557–564. IEEE, Piscataway, NJ (2017)Google Scholar
- 24 Seibold S., Samman G.: Consensus: immutable agreement for the internet of value. KPMG. https://assets.kpmg.com/content/dam/kpmg/pdf/2016/06/kpmgblockchain‐consensus‐mechanism.pdf (2016)Google Scholar
- 25 Dwork C., Naor M.: Pricing via processing or combatting junk mail. In: Annual International Cryptology Conference, pp.139–147. Springer, New York (1992)Google Scholar
- 26 QuantumMechanic. Proof of stake instead of proof of work. https://bitcointalk.org/index.php?topic=27787.0 (2011). Accessed 11 July 2011Google Scholar
- 27 King S., Nadal S.: Ppcoin: Peer‐to‐peer crypto‐currency with proof‐of‐stake. Self‐published paper, August 19(1) (2012)Google Scholar
- 28 Larimer D.: Delegated proof‐of‐stake (dpos). Bitshare Whitepaper 81, 85 (2014)Google Scholar
- 29 Andrey A., Petr C.: Review of existing consensus algorithms blockchain. In: 2019 International Conference “Quality Management, Transport and Information Security, Information Technologies”(IT&QM&IS), pp.124–127. IEEE, Piscataway, NJ (2019)Google Scholar
- 30 Curran B.: What is proof of elapsed time consensus? (PoET) Complete beginner's guide. https://www.investopedia.com/terms/p/proof‐elapsed‐time‐cryptocurrency.asp. Accessed March 2019Google Scholar
- 31 Maxwell G.: Proof of storage to make distributed resource consumption costly. https://bitcointalk.org/index.php?topic=310323.0Google Scholar
- 32 Yaga D., Mell P., Roby N., Scarfone K.: Blockchain technology overview. arXiv preprint arXiv:190611078 (2019)Google Scholar
- 33 Castro M., Liskov B., etal.: Practical byzantine fault tolerance. In: Proceedings of the Third Symposium on Operating Systems Design and Implementation, vol. 99, pp.173–186. New Orleans, USA, February 1999Google Scholar
- 34 Mazieres D.: The stellar consensus protocol: a federated model for internet‐level consensus. Stellar Development Foundation 32 (2015)Google Scholar
- 35 Zheng Z., Xie S., Dai H.N., Chen W., Chen X., Weng J., etal.: An overview on smart contracts: challenges, advances and platforms. Future Gener. Comput. Syst. 105, 475–491 (2020)Google Scholar
Digital Library
- 36 Zhou B., Xie Z., Ye F.: Multi‐modal face authentication using deep visual and acoustic features. In: ICC 2019‐2019 IEEE International Conference on Communications (ICC), pp.1–6. IEEE, Piscataway, NJ (2019)Google Scholar
- 37 Zhou T., Li X., Zhao H.: Everssdi: blockchain‐based framework for verification, authorisation and recovery of self‐sovereign identity using smart contracts. Int. J. Comput. Appl. Technol. 60(3), 281–295 (2019)Google Scholar
Digital Library
- 38 Chui M., Issler M., Roberts R., Yee L.: Technology trends outlook 2023. (2023). http://dln.jaipuria.ac.in:8080/jspui/bitstream/123456789/14260/1/Mckinsey‐technology‐trends‐outlook‐2023.pdfGoogle Scholar
- 39 Gomathi C., Jayasri K.: Rain drop service and biometric verification based blockchain technology for securing the bank transactions from cyber crimes using weighted fair blockchain (WFB) algorithm. Cybernet. Syst. 54(4), 550–576 (2023)Google Scholar
- 40 Sarier N.D.: Efficient biometric‐based identity management on the blockchain for smart industrial applications. Pervasive Mob. Comput. 71,
101322 (2021)Google ScholarCross Ref
- 41 Kumar M.M., Prasad M.V., Raju U.: BMIAE: blockchain‐based multi‐instance iris authentication using additive ELGamal hom*omorphic encryption. IET Biometrics 9(4), 165–177 (2020)Google Scholar
- 42 Delgado‐Mohatar O., Fierrez J., Tolosana R., Vera‐Rodriguez R.: Blockchain and biometrics: a first look into opportunities and challenges. In: International Congress on Blockchain and Applications, pp.169–177. Springer, New York (2019)Google Scholar
- 43 Delgado‐Mohatar O., Fierrez J., Tolosana R., Vera‐Rodriguez R.: Blockchain meets biometrics: concepts, application to template protection, and trends. arXiv preprint arXiv:200309262 (2020)Google Scholar
- 44 Wiki B.Weaknesses. https://en.bitcoin.it/wiki/Weaknesses#Attacker_has_a_lot_of_computing_power (2023). Accessed 30 October 2023Google Scholar
- 45 Jain A.K., Ross A., Prabhakar S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)Google Scholar
Digital Library
- 46 Matyas V., Riha Z.: Toward reliable user authentication through biometrics. IEEE Secur. Privacy 1(3), 45–49 (2003)Google Scholar
- 47 ISO: ISO/IEC 24745:2022 Information ecurity, cybersecurity and privacy protection—biometric information protection. https://www.iso.org/standard/75302.html (2022). Accessed February 2022Google Scholar
- 48 Jain A.K., Nandakumar K., Nagar A.: Biometric template security. EURASIP J Adv Signal Process. 2008, 1–17 (2008)Google Scholar
Digital Library
- 49 Hadid A., Evans N., Marcel S., Fierrez J.: Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Process Mag. 32(5), 20–30 (2015)Google Scholar
Cross Ref
- 50 Gomez‐Barrero M., Galbally J., Fierrez J.: Efficient software attack to multimodal biometric systems and its application to face and iris fusion. Pattern Recognit. Lett. 36, 243–253 (2014)Google Scholar
Digital Library
- 51 Ratha N.K., Connell J.H., Bolle R.M.: An analysis of minutiae matching strength. In: International Conference on Audio‐and Video‐Based Biometric Person Authentication, pp.223–228. Springer, New York (2001)Google Scholar
- 52 Marcel S., Nixon M.S., Fierrez J., Evans N.: Handbook of Biometric Anti‐spoofing: Presentation Attack Detection. Springer, New York (2019)Google Scholar
Cross Ref
- 53 Gomez‐Barrero M., Galbally J., Morales A., Fierrez J.: Privacy‐preserving comparison of variable‐length data with application to biometric template protection. IEEE Access 5, 8606–8619 (2017)Google Scholar
Cross Ref
- 54 Gomez‐Barrero M., Maiorana E., Galbally J., Campisi P., Fierrez J.: Multi‐biometric template protection based on hom*omorphic encryption. Pattern Recognit. 67, 149–163 (2017)Google Scholar
Digital Library
- 55 Delgado‐Mohatar O., Fierrez J., Tolosana R., Vera‐Rodriguez R.: Biometric template storage with blockchain: a first look into cost and performance tradeoffs. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognit. Workshops, pp.2829–2837. IEEE, Piscataway, NJ (2019)Google Scholar
- 56 Acquah M.A., Chen N., Pan J.S., Yang H.M., Yan B.: Securing fingerprint template using blockchain and distributed storage system. Symmetry 12(6), 951 (2020)Google Scholar
- 57 Goel A., Agarwal A., Vatsa M., Singh R., Ratha N.: Securing cnn model and biometric template using blockchain. In: 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp.1–7. IEEE, Piscataway, NJ (2019)Google Scholar
- 58 Ferdous M.S., Chowdhury F., Alassafi M.O.: In search of self‐sovereign identity leveraging blockchain technology. IEEE Access 7, 103059–103079 (2019)Google Scholar
Cross Ref
- 59 Jøsang A., Pope S.: User centric identity management. In: AusCERT Asia Pacific Information Technology Security Conference, vol. 77. Citeseer (2005)Google Scholar
- 60 He Z., Xiaofeng L., Likui Z., Zhong‐Cheng W.: Data integrity protection method for microorganism sampling robots based on blockchain technology. Journal of Huazhong University of Science and Technology (Natural Science Edition) 43(Z1), 216–219 (2015)Google Scholar
- 61 Hammudoglu J., Sparreboom J., Rauhamaa J., Faber J., Guerchi L., Samiotis I.P., etal.: Portable trust: biometric‐based authentication and blockchain storage for self‐sovereign identity systems. arXiv preprint arXiv:170603744 (2017)Google Scholar
- 62 Liu Y., Zhao Z., Guo G., Wang X., Tan Z., Wang S.: An identity management system based on blockchain. In: 2017 15th Annual Conference on Privacy, Security and Trust (PST), pp.4400–4409. IEEE, Piscataway, NJ (2017)Google Scholar
- 63 Gao Z., Xu L., Turner G., Patel B., Diallo N., Chen L., etal.: Blockchain‐based identity management with mobile device. In: Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, pp.66–70. ACM, New York (2018)Google Scholar
- 64 Sarier N.D.: Privacy preserving biometric identification on the bitcoin blockchain. In: International Symposium on Cyberspace Safety and Security, pp.254–269. Springer, New York (2018)Google Scholar
- 65 Liu Y., Sun G., Schuckers S.: Enabling secure and privacy preserving identity management via smart contract. In: 2019 IEEE conference on communications and network security (CNS), pp.1–8. IEEE, Piscataway, NJ (2019)Google Scholar
- 66 Odelu V.: Imbua: identity management on blockchain for biometrics‐based user authentication. In: International Congress on Blockchain and Applications, pp.1–10. Springer, New York (2019)Google Scholar
- 67 Huh J.H., Seo K.: Blockchain‐based mobile fingerprint verification and automatic log‐in platform for future computing. J. Supercomput. 75(6), 3123–3139 (2019)Google Scholar
Digital Library
- 68 Páez R., Pérez M., Ramírez G., Montes J., Bouvarel L.: An architecture for biometric electronic identification document system based on blockchain. Future Internet 12(1), 10 (2020)Google Scholar
- 69 Sarier N.D.: Comments on biometric‐based non‐transferable credentials and their application in blockchain‐based identity management. Comput. Secur. 105,
102243 (2021)Google Scholar - 70 Mishra P., Modanwal V., Kaur H., Varshney G.: Pseudo‐biometric identity framework: achieving self‐sovereignity for biometrics on blockchain. In: 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp.945–951. IEEE, Piscataway, NJ (2021)Google Scholar
- 71 Bhattacharyya D., Ranjan R., Alisherov F., Choi M., etal.: Biometric authentication: a review. International Journal of u‐and e‐Service, Science and Technology 2(3), 13–28 (2009)Google Scholar
- 72 Jain A.K., Nandakumar K.: Biometric authentication: system security and user privacy. Computer 45(11), 87–92 (2012)Google Scholar
Digital Library
- 73 Ignatenko T., Willems F.: On privacy in secure biometric authentication systems. In: 2007 IEEE International Conference on Acoustics, Speech and Signal Processing‐ICASSP'07, vol. 2, pp.II–121. IEEE, Piscataway, NJ (2007)Google Scholar
- 74 Buchmann N., Rathgeb C., Baier H., Busch C., Margraf M.: Enhancing breeder document long‐term security using blockchain technology. In: 41st Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp.744–748. IEEE, Piscataway, NJ (2017)Google Scholar
- 75 Juan M.D., Andrés R.P., Rafael P.M., Gustavo R.E., Manuel P.C.: A model for national electronic identity document and authentication mechanism based on blockchain. Int. J. Model Optim. 8(3), 160–165 (2018)Google Scholar
Cross Ref
- 76 Zhou X., Hafedh Y., Wang Y., Jesus V.: A simple auditable fingerprint authentication scheme using smart‐contracts. In: International Conference on Smart Blockchain, pp.86–92. Springer, New York (2018)Google Scholar
- 77 Sawant G., Bharadi V.: Permission blockchain based smart contract utilizing biometric authentication as a service: a future trend. In: 2020 International Conference on Convergence to Digital World‐Quo Vadis (ICCDW), pp.1–4. IEEE, Piscataway, NJ (2020)Google Scholar
- 78 Toutara F., Spathoulas G.: A distributed biometric authentication scheme based on blockchain. In: 2020 IEEE International Conference on Blockchain (Blockchain), pp.470–475. IEEE, Piscataway, NJ (2020)Google Scholar
- 79 Dinesh A.D., Reddy C.D.P., Gopi G.V., Jain R., Shankar T.: A durable biometric authentication scheme via blockchain. In: 2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), pp.1–5. IEEE, Piscataway, NJ (2021)Google Scholar
- 80 Zhu H., Li Z.: An efficient biometric authenticated protocol for arbitrary‐domain‐server with blockchain technology. Int. J. Network Secur. 23(3), 386–394 (2021)Google Scholar
- 81 Bao D., You L.: Two‐factor identity authentication scheme based on blockchain and fuzzy extractor. Soft Comput. 1–13 (2021)Google Scholar
- 82 Lee Y.K., Jeong J.: Securing biometric authentication system using blockchain. ICT Express 7(3), 322–326 (2021)Google Scholar
Cross Ref
- 83 Morampudi M.K., Prasad M.V., Raju‐Undi S.N.: Sviab: Secure and verifiable multi‐instance iris remote authentication using blockchain. IET Biometrics 11(1), 35–50 (2022)Google Scholar
Cross Ref
- 84 Tobin A., Reed D.: The inevitable rise of self‐sovereign identity. The Sovrin Foundation 29(2016), (2016). https://sovrin.org/wp‐content/uploads/2017/06/The‐Inevitable‐Rise‐of‐Self‐Sovereign‐Identity.pdfGoogle Scholar
- 85 Ali M., Shea R., Nelson J., Freedman M.J.: Blockstack: a new internet for decentralized applications. Technical Whitepaper Version 1 (2017). https://docs.huihoo.com/blockstack/Blockstack‐A‐New‐Decentralized‐Internet.pdfGoogle Scholar
- 86 Panetta R., Cristofaro L.: A closer look at the eu‐funded my health my data project. Digital Health Legal 10–11 (2017)Google Scholar
- 87 Fromknecht C., Velicanu D., Yakoubov S.: Certcoin: A namecoin based decentralized authentication system. Massachusetts Institute of Technology, Cambridge, MA, USA, Technical Report, vol. 6, pp.46–56 (2014)Google Scholar
- 88 Lim S.Y., Fotsing P.T., Almasri A., Musa O., Kiah M.L.M., Ang T.F., etal.: Blockchain technology the identity management and authentication service disruptor: a survey. Int. J. Adv. Sci., Eng. Inform. Technol. 8(4‐2), 1735–1745 (2018)Google Scholar
- 89 Lundkvist C., Heck R., Torstensson J., Mitton Z., Sena M.: Uport: a platform for self‐sovereign identity, draft version (2016‐10‐20). Consensys, New York (2016)Google Scholar
- 90 Leimgruber J., Backus A.: Bloom protocol: decentralized credit scoring powered by Ethereum and IPFS. Early Community Draft Version 03 Subject to Change, Longwood, FL, USA, White Paper (2018)Google Scholar
- 91 Ismail R.: Enhancement of online identity authentication though blockchain technology (2017). https://www.dappleworks.com/assets/files/oia‐blockchain.pdfGoogle Scholar
Cited By
View all
Recommendations
- Keystroke Biometric Systems for User Authentication
Keystroke biometrics (KB) authentication systems are a less popular form of access control, although they are gaining popularity. In recent years, keystroke biometric authentication has been an active area of research due to its low cost and ease of ...
Read More
- Continuous Authentication Using Behavioral Biometrics
A continuous behaviometric authentication system is tested on 99 users over 10 weeks, focusing on keystroke dynamics, mouse movements, application usage, and the system footprint. In the process, a new trust model was created to enable continuous ...
Read More
- Partial palm vein based biometric authentication
Abstract
Palm vein biometrics is a potential authentication technique. In addition to the inherent liveness property, the palm vein pattern exhibits high authentication accuracy and anti-spoofing capability due to the dense vein pattern and ...
Read More
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in
Full Access
Get this Article
- Information
- Contributors
Published in
IET Blockchain Volume 4, Issue 2
June 2024
121 pages
EISSN:2634-1573
DOI:10.1049/blc2.v4.2
Issue’s Table of Contents
© 2024 The Authors. IET Blockchain published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology.
This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited.
Sponsors
In-Cooperation
Publisher
John Wiley & Sons, Inc.
United States
Publication History
- Published: 1 February 2024
Author Tags
- authentication
- biometrics (access control)
- blockchains
- data protection
- decentralised applications
- distributed processing
Qualifiers
- review-article
Conference
Funding Sources
Other Metrics
View Article Metrics
- Bibliometrics
- Citations0
Article Metrics
- View Citations
Total Citations
Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
View Author Metrics
Cited By
This publication has not been cited yet
Digital Edition
View this article in digital edition.
View Digital Edition
- Figures
- Other
Close Figure Viewer
Browse AllReturn
Caption
View Issue’s Table of Contents