<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0121-750X</journal-id>
<journal-title><![CDATA[Ingeniería]]></journal-title>
<abbrev-journal-title><![CDATA[ing.]]></abbrev-journal-title>
<issn>0121-750X</issn>
<publisher>
<publisher-name><![CDATA[Universidad Distrital Francisco José de Caldas]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0121-750X2023000400204</article-id>
<article-id pub-id-type="doi">10.14483/23448393.19656</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[A bibliometric study of scientific production on self-sovereign identity]]></article-title>
<article-title xml:lang="es"><![CDATA[Estudio bibliométrico de la producción científica sobre identidad auto-soberana]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Pava Díaz]]></surname>
<given-names><![CDATA[Roberto Albeiro]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Páez Méndez]]></surname>
<given-names><![CDATA[Rafael Vicente]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Niño Vásquez]]></surname>
<given-names><![CDATA[Luis Fernando]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Distrital Francisco José de Caldas  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Pontificia Universidad Javeriana  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad Nacional de Colombia  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>04</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>04</month>
<year>2023</year>
</pub-date>
<volume>28</volume>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S0121-750X2023000400204&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S0121-750X2023000400204&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S0121-750X2023000400204&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract  Context: Self-sovereign identity (SSI) enables the creation of user-centric, privacy-by-design, secure, and decentralized identity management systems. The aim of this paper is to carry out a bibliometric analysis of the scientific production on SSI during the 2017-2022 period.  Method:  A complete bibliometric analysis of all publications on SSI indexed in Scopus and Web of Science was carried out. A corpus of 143 articles was examined by processing their bibliographic metadata via a bibliometric tool. To this effect, the Bibliometrix package and the R programming language were used.  Results:  A bibliometric characterization of the publications on SSI was obtained for the 2017-2022 period. The most important keywords used in these publications were identified, as well as their use tendencies throughout this period. Moreover, the most influential authors in the area and the most relevant publication sources were identified.  Conclusions:  The results of the bibliometric analysis show that Lotka and Bradford&#8217;s laws apply for academic publications on SSI, which means that the most relevant publications in this area are concentrated in a relatively small group of authors and journals. Paul Jenkins, Nitin Naik, Yang Liu, and Aijun An were the most impactful authors, and Lecture Notes in Computer Science, Frontiers in Blockchain, and IEEE Access were the most influential journals. Finally, the keyword analysis showed that blockchain, authentication, identity management, electronic document identification systems, and digital identity are currently the most relevant concepts for research on SSI.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen  Contexto: La identidad auto-soberana (SSI) permite la creación de sistemas de gestión de identidad centrados en el usuario, con privacidad desde el diseño, seguros y descentralizados. El objetivo de este artículo es realizar un análisis bibliométrico de la producción científica sobre SSI durante el periodo 2017-2022.  Método: Se realizó una análisis bibliométrico completo de las publicaciones sobre SSI indexadas en Scopus y Web of Science. Se examinó un corpus de 143 artículos mediante el procesamiento de sus metadatos bibliográficos mediante una herramienta de análisis bibliométrico. Para ello se utilizaron el paquete Bibliometrix y el lenguaje de programación R.  Resultados:  Se obtuvo una caracterización bibliométrica de las publicaciones sobre SSI durante el periodo 2017-2022. Se identificaron las palabras clave más importantes, así como las tendencias de uso de las mismas durante este periodo. Además, se identificaron los autores de mayor influencia en el área y las fuentes de publicación más relevantes.  Conclusiones:  Los resultados del análisis bibliométrico completo muestran que la ley de Lotka y la ley de Bradford se cumplen en las publicaciones sobre SSI. Esto quiere decir que las publicaciones de mayor alcance e impacto están concentradas en unos pocos autores y revistas. Paul Jenkins, Nitin Naik , Yang Liu y Aijun An resultaron ser los autores más representativos, y Lecture Notes in Computer Science, IEEE Access y Frontiers in Blockchain resultaron ser las revistas más influyentes. Finalmente, el análisis de las palabras clave mostró que blockchain, authentication, identity management, electronic document identification systems y digital identity son actualmente los conceptos más importantes para la investigación sobre SSI.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[self-sovereign identity]]></kwd>
<kwd lng="en"><![CDATA[SSI]]></kwd>
<kwd lng="en"><![CDATA[DLT]]></kwd>
<kwd lng="en"><![CDATA[blockchain]]></kwd>
<kwd lng="en"><![CDATA[identity management]]></kwd>
<kwd lng="en"><![CDATA[bibliometric análisis.]]></kwd>
<kwd lng="es"><![CDATA[identidad digital auto-soberana]]></kwd>
<kwd lng="es"><![CDATA[SSI]]></kwd>
<kwd lng="es"><![CDATA[DLT]]></kwd>
<kwd lng="es"><![CDATA[blockchain]]></kwd>
<kwd lng="es"><![CDATA[gestión de identidad]]></kwd>
<kwd lng="es"><![CDATA[análisis bibliométrico.]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>[1]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abraham]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Koch]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[More]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Ramacher]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Stopar]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;Privacy-preserving eID derivation to self-sovereign identity systems with offline revocation,&#8221;]]></source>
<year>2021</year>
<page-range>506-13</page-range><publisher-name><![CDATA[TrustCom]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<label>[2]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abraham]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[More]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Rabensteiner]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hörandner]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;Revocable and offline-verifiable self-sovereign identities,&#8221;]]></source>
<year>2020</year>
<page-range>1020-7</page-range><publisher-name><![CDATA[TrustCom]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<label>[3]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abraham]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Schinnerl]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[More]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;SSI strong authentication using a mobile-phone based identity wallet reaching a high level of assurance,&#8221;]]></source>
<year>2021</year>
<page-range>137-48</page-range><publisher-name><![CDATA[Secrypt]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>[4]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kassem]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Sayeed]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Marco-Gisbert]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Pervez]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Dahal]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;DNS-IdM: A blockchain identity management system to secure personal data sharing in a network,&#8221;]]></article-title>
<source><![CDATA[Appl. Sci.]]></source>
<year>2019</year>
<volume>9</volume>
<numero>15</numero>
<issue>15</issue>
</nlm-citation>
</ref>
<ref id="B5">
<label>[5]</label><nlm-citation citation-type="">
<collab>Clarivate Analytics</collab>
<source><![CDATA[&#8220;Web of science&#8221;]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B6">
<label>[6]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aria]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Cuccurullo]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[bibliometrix: An R-tool for comprehensive science mapping analysis]]></article-title>
<source><![CDATA[J. Informetr.]]></source>
<year>2017</year>
<volume>11</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>959-75</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>[7]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bandara]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Liang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Foytik]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Shetty]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;Blockchain and self-sovereign identity empowered cyber threat information sharing platform,&#8221;]]></source>
<year>2021</year>
<page-range>258-63</page-range><publisher-name><![CDATA[Smartcomp]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<label>[8]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bandara]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;A blockchain empowered and privacy preserving digital contact tracing platform,&#8221;]]></article-title>
<source><![CDATA[Inf. Process. Manag.]]></source>
<year>2021</year>
<volume>58</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B9">
<label>[9]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bandara]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Liang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Foytik]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Shetty]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[De Zoysa]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;A blockchain and self-sovereign identity empowered digital identity platform,&#8221;]]></source>
<year>2021</year>
<page-range>1-7</page-range><publisher-name><![CDATA[ICCCN]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<label>[10]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bandara]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;Promize - blockchain and self-sovereign identity empowered mobile atm platform,&#8221; in Intelligent Computing. Lecture Notes in Networks and Systems., K. Arai, Ed.]]></source>
<year>2021</year>
<volume>284</volume>
<page-range>891-911</page-range><publisher-loc><![CDATA[Berlin, Germany ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>[11]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bendiab]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kolokotronis]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Shiaeles]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Boucherkha]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;Wip: A novel blockchain-based trust model for cloud identity management,&#8221;]]></source>
<year>2018</year>
<conf-name><![CDATA[ 2018 IEEE 16th Intl. Conf Dependable, Autonomic Sec. Comp., 16th Int. Conf. Perv. Intell. Comp., 4th Int. Conf. Big Data Intell. Comp. and Cyber Sci. Tech. Congress (DASC/PiCom/DataCom/CyberSciTech)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>724-9</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>[12]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bernal-Bernabe]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Canovas]]></surname>
<given-names><![CDATA[J. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Hernández-Ramos]]></surname>
<given-names><![CDATA[J. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Torres-Moreno]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Skarmeta]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;Privacy-preserving solutions for blockchain: Review and challenges,&#8221;]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2019</year>
<volume>4</volume>
<page-range>1-33</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>[13]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bouras]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Dhelim]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Ning]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;A lightweight blockchain-based IoT identity management approach&#8221;]]></article-title>
<source><![CDATA[Fut. Int]]></source>
<year>2021</year>
<volume>13</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B14">
<label>[14]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brookes]]></surname>
<given-names><![CDATA[B.C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;&#8216;Sources of information on specific subjects"by S.C. Bradford,&#8217;&#8221;]]></article-title>
<source><![CDATA[J. Inf. Sci. Eng.]]></source>
<year>1985</year>
<volume>10</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>173-5</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>[15]</label><nlm-citation citation-type="">
<collab>Civic Technologies</collab>
<source><![CDATA[&#8220;Civic whitepaper,&#8221;]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B16">
<label>[16]</label><nlm-citation citation-type="">
<collab>ConsenSys</collab>
<source><![CDATA[&#8220;uPort - Tools for Decentralized Identity and Trusted Data,&#8221;]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B17">
<label>[17]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Montjoye]]></surname>
<given-names><![CDATA[Y. A. De]]></given-names>
</name>
<name>
<surname><![CDATA[Shmueli]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[S. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Pentland]]></surname>
<given-names><![CDATA[A. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;OpenPDS: Protecting the privacy of metadata through SafeAnswers,&#8221;]]></article-title>
<source><![CDATA[PLoS One]]></source>
<year>2014</year>
<volume>9</volume>
<numero>7</numero>
<issue>7</issue>
</nlm-citation>
</ref>
<ref id="B18">
<label>[18]</label><nlm-citation citation-type="">
<collab>DIF Foundation</collab>
<source><![CDATA[&#8217;DIF - decentralized identity foundation]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B19">
<label>[19]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dunphy]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Petitcolas]]></surname>
<given-names><![CDATA[F. A. P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;A first look at identity management schemes on the blockchain,&#8221;]]></article-title>
<source><![CDATA[IEEE Secur. Priv.]]></source>
<year>2018</year>
<volume>16</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>20-9</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>[20]</label><nlm-citation citation-type="">
<collab>Elsevier</collab>
<source><![CDATA[&#8216;&#8217;Scopus,&#8221;]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B21">
<label>[21]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Faber]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Michelet]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Weidmann]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Mukkamala]]></surname>
<given-names><![CDATA[R. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Vatrapu]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;BPDIMS: A blockchain-based personal data and identity management system,&#8221;]]></source>
<year>2019</year>
<conf-name><![CDATA[ 52nd Hawaii Int. Conf. Sys. Sci.]]></conf-name>
<conf-loc> </conf-loc>
<page-range>6855-64</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>[22]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ferdous]]></surname>
<given-names><![CDATA[Md. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Chowdhury]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Alassafi]]></surname>
<given-names><![CDATA[M. O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;In search of self-sovereign identity leveraging blockchain technology,&#8221;]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2019</year>
<volume>7</volume>
<page-range>103059-79</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>[23]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<source><![CDATA[Blockchain-based identity management with mobile device,&#8221; in CryBlock&#8217;18]]></source>
<year>2018</year>
<page-range>66-70</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>[24]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goodell]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Aste]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;A decentralized digital identity architecture,&#8221;]]></article-title>
<source><![CDATA[Front. Blockchain]]></source>
<year>2019</year>
<numero>2</numero>
<issue>2</issue>
<page-range>1-19</page-range></nlm-citation>
</ref>
<ref id="B25">
<label>[25]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grüner]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mühle]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gayvoronskaya]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Meinel]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;A quantifiable trust model for blockchain-based identity management,&#8221;]]></source>
<year>2018</year>
<page-range>1475-82</page-range><publisher-name><![CDATA[iThings/ GreenCom/ CPSCom/ SmartData/ Blockchain/ CIT]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<label>[26]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grüner]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mühle]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Meinel]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;An integration architecture to enable service providers for self-sovereign identity,&#8221; in 2019 IEEE 18th Int. Symp. Network Comp. App. (NCA)]]></source>
<year>2019</year>
<page-range>1-5</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>[27]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grüner]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mühle]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Meinel]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;ATIB: Design and evaluation of an architecture for brokered self-sovereign identity integration and trust-enhancing attribute aggregation for service provider,&#8221; IEEE Access]]></source>
<year>2021</year>
<volume>9</volume>
<page-range>138553-70</page-range></nlm-citation>
</ref>
<ref id="B28">
<label>[28]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gstrein]]></surname>
<given-names><![CDATA[O. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Kochenov]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;Digital identity and distributed ledger technology: Paving the way to a neo-feudal brave new world? &#8220;]]></article-title>
<source><![CDATA[Front. Blockchain]]></source>
<year>2020</year>
<volume>3</volume>
<numero>00010</numero>
<issue>00010</issue>
</nlm-citation>
</ref>
<ref id="B29">
<label>[29]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Haddouti]]></surname>
<given-names><![CDATA[S. El]]></given-names>
</name>
<name>
<surname><![CDATA[Dafir Ech-Cherif El Kettani]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;Analysis of identity management systems using blockchain technology&#8221; in CommNet]]></source>
<year>2019</year>
<page-range>1-7</page-range></nlm-citation>
</ref>
<ref id="B30">
<label>[30]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kondova]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Erbguth]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;Self-sovereign identity on public blockchains and the GDPR,&#8221; in SAC&#8217;20]]></source>
<year>2020</year>
<page-range>342-5</page-range></nlm-citation>
</ref>
<ref id="B31">
<label>[31]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kuperberg]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;Blockchain-based identity management: A survey from the enterprise and ecosystem perspective,&#8221;]]></article-title>
<source><![CDATA[IEEE Trans. Eng. Manag]]></source>
<year>2020</year>
<volume>67</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1008-27</page-range></nlm-citation>
</ref>
<ref id="B32">
<label>[32]</label><nlm-citation citation-type="">
<collab>Scimago Lab</collab>
<source><![CDATA[&#8216;&#8217;Scimago journal and country rank,&#8221;]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B33">
<label>[33]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Khan]]></surname>
<given-names><![CDATA[M. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Choo]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;A new transitively closed undirected graph authentication scheme for blockchain-based identity management systems,&#8221;]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2018</year>
<volume>6</volume>
<page-range>28203-12</page-range></nlm-citation>
</ref>
<ref id="B34">
<label>[34]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Obaidat]]></surname>
<given-names><![CDATA[M. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Khan]]></surname>
<given-names><![CDATA[M. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Choo]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;Blockchain-based identity management systems: A review,&#8221;]]></article-title>
<source><![CDATA[J. Network Comp. Appl.]]></source>
<year>2020</year>
<volume>166</volume>
</nlm-citation>
</ref>
<ref id="B35">
<label>[35]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Paik]]></surname>
<given-names><![CDATA[H.-Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Xiwei]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;Design patterns for blockchain-based self-sovereign identity,&#8221; in EuroPLoP 2020]]></source>
<year>2020</year>
<numero>16</numero>
<issue>16</issue>
</nlm-citation>
</ref>
<ref id="B36">
<label>[36]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Paik]]></surname>
<given-names><![CDATA[H.-Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;Design pattern as a service for blockchain-based self-sovereign identity.&#8221;]]></article-title>
<source><![CDATA[IEEE Soft]]></source>
<year>2020</year>
<volume>37</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>30-6</page-range></nlm-citation>
</ref>
<ref id="B37">
<label>[37]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;A blockchain-based platform architecture for multimedia data management,&#8221;]]></article-title>
<source><![CDATA[Multimedia Tools Appl.]]></source>
<year>2021</year>
<volume>80</volume>
<numero>20</numero>
<issue>20</issue>
<page-range>30707-23</page-range></nlm-citation>
</ref>
<ref id="B38">
<label>[38]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lotka]]></surname>
<given-names><![CDATA[A. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;The frequency distribution of scientific productivity,&#8221;]]></article-title>
<source><![CDATA[J. Wash. Acad. Sci.]]></source>
<year>1926</year>
<volume>16</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>317-23</page-range></nlm-citation>
</ref>
<ref id="B39">
<label>[39]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lyons]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Courcelas]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Timsit]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA["Blockchain and digital identity,"]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B40">
<label>[40]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mühle]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Grüner]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gayvoronskaya]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Meinel]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;A survey on essential components of a self-sovereign identity,&#8221;]]></article-title>
<source><![CDATA[Comput. Sci. Rev.]]></source>
<year>2018</year>
<volume>30</volume>
<page-range>80-6</page-range></nlm-citation>
</ref>
<ref id="B41">
<label>[41]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Naik]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Grace]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Jenkins]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8216;&#8217;An attack tree based risk analysis method for investigating attacks and facilitating their mitigations in self-sovereign identity,&#8221; in 2021 IEEE Symp. Series Comp. Int. (SSCI)]]></source>
<year>2021</year>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B42">
<label>[42]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Naik]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Jenkins]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8216;&#8217;Governing principles of self-sovereign identity applied to blockchain enabled privacy preserving identity management systems&#8221;, in ISSE 2020]]></source>
<year>2020</year>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B43">
<label>[43]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Naik]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Jenkins]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[üPort open-source identity management system: An assessment of self-sovereign identity and user-centric data platform built on blockchain,ïn ISSE 2020]]></source>
<year>2020</year>
<page-range>1-7</page-range></nlm-citation>
</ref>
<ref id="B44">
<label>[44]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Naik]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Jenkins]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;Your identity is yours: Take back control of your identity using GDPR compatible self-sovereign identity,&#8221;]]></source>
<year>2020</year>
<conf-name><![CDATA[ 2020 7th Int. Conf. Behaviour. Soc. Comp. (BESC)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B45">
<label>[45]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Naik]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Jenkins]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;Does Sovrin network offer sovereign identity?&#8221; in ISSE 2021]]></source>
<year>2021</year>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B46">
<label>[46]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Naik]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Jenkins]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;Sovrin network for decentralized digital identity: Analysing a self-sovereign identity system based on distributed ledger technology,&#8221; in ISSE 2021]]></source>
<year>2021</year>
<page-range>1-7</page-range></nlm-citation>
</ref>
<ref id="B47">
<label>[47]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Othman]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Callahan]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;The horcrux protocol: A method for decentralized biometric-based self-sovereign identity,&#8221; in IJCNN 2018]]></source>
<year>2018</year>
<page-range>1-7</page-range></nlm-citation>
</ref>
<ref id="B48">
<label>[48]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Panait]]></surname>
<given-names><![CDATA[A.-E.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;Is the user identity perception influenced by the blockchain technology?]]></source>
<year></year>
<conf-name><![CDATA[ 2020 IEEE Int. Conf. Intell. Sec. Inform. (ISI)]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B49">
<label>[49]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Panait]]></surname>
<given-names><![CDATA[A.-E.]]></given-names>
</name>
<name>
<surname><![CDATA[Olimid]]></surname>
<given-names><![CDATA[R. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Maimut]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Oprina]]></surname>
<given-names><![CDATA[A.-G.]]></given-names>
</name>
<name>
<surname><![CDATA[Sauveron]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;On using zk-SNARKs and zk-STARKs in blockchain-based identity management,&#8221; in Innovative Security Solutions for Information Technology and Communications. SecITC 2020. Lecture Notes in Computer Science]]></source>
<year>2021</year>
<volume>12596</volume>
<page-range>130-45</page-range><publisher-loc><![CDATA[Cham, Germany ]]></publisher-loc>
<publisher-name><![CDATA[Springer International Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B50">
<label>[50]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Panait]]></surname>
<given-names><![CDATA[A.-E.]]></given-names>
</name>
<name>
<surname><![CDATA[Olimid]]></surname>
<given-names><![CDATA[R. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Stefanescu]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gritzalis]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Weippl]]></surname>
<given-names><![CDATA[E. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Kotsis]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Min Tjoa]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Khalil]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;Analysis of uPort Open, an identity management blockchain-based solution,&#8221; in Trust, Privacy and Security in Digital Business. TrustBus 2020. Lecture Notes in Computer Science]]></source>
<year>2020</year>
<volume>12395</volume>
<page-range>3-13</page-range><publisher-loc><![CDATA[Cham,Germany ]]></publisher-loc>
<publisher-name><![CDATA[Springer International Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B51">
<label>[51]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Panait]]></surname>
<given-names><![CDATA[A.-E.]]></given-names>
</name>
<name>
<surname><![CDATA[Olimid]]></surname>
<given-names><![CDATA[R. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Stefanescu]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;Identity management on blockchain-privacy and security aspects,&#8221;]]></article-title>
<source><![CDATA[Proc. Rom. Acad. Ser. A Math. Phys. Tech. Sci. Inf. Sci.]]></source>
<year>2020</year>
<volume>21</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>45-52</page-range></nlm-citation>
</ref>
<ref id="B52">
<label>[52]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Niño-Vásquez]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Pava-Díaz]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Páez-Mendez]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[López-Sarmiento]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA["Preprocesamiento de publicaciones acerca de identidad digital descentralizada y autogobernada,&#8221;]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B53">
<label>[53]</label><nlm-citation citation-type="">
<collab>R Core Team</collab>
<source><![CDATA[R: A language and environment for statistical computing]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B54">
<label>[54]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schmidt]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Mühle]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Grüner]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Meinel]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;Clear the fog: Towards a taxonomy of self-sovereign identity ecosystem members,&#8221;]]></source>
<year>2021</year>
<conf-name><![CDATA[ 2021 18th Int. Conf. Priv. Sec. Trust (PST)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-7</page-range></nlm-citation>
</ref>
<ref id="B55">
<label>[55]</label><nlm-citation citation-type="">
<collab>ShoCard Inc.</collab>
<source><![CDATA[&#8216;&#8217;Identity management verified using the blockchain,&#8221;]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B56">
<label>[56]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Soltani]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Nguyen]]></surname>
<given-names><![CDATA[U. T.]]></given-names>
</name>
<name>
<surname><![CDATA[An]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;Practical key recovery model for self-sovereign identity based digital wallets,&#8221;]]></source>
<year>2019</year>
<page-range>320-5</page-range><publisher-name><![CDATA[2019 DASC-PICom-CBDCom-CyberSciTech]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B57">
<label>[57]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Soltani]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Nguyen]]></surname>
<given-names><![CDATA[U. T.]]></given-names>
</name>
<name>
<surname><![CDATA[An]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;Decentralized and privacy-preserving key management model,&#8221; in ISNCC 2020]]></source>
<year>2020</year>
<page-range>1-7</page-range></nlm-citation>
</ref>
<ref id="B58">
<label>[58]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Soltani]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Nguyen]]></surname>
<given-names><![CDATA[U. T.]]></given-names>
</name>
<name>
<surname><![CDATA[An]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;A survey of self-sovereign identity ecosystem,&#8221;]]></source>
<year>2021</year>
<volume>2021</volume>
<numero>8873429</numero>
<issue>8873429</issue>
<publisher-name><![CDATA[Sec. Commun. Networks]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B59">
<label>[59]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Soltani]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Nguyen]]></surname>
<given-names><![CDATA[U. T.]]></given-names>
</name>
<name>
<surname><![CDATA[An]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;A new approach to client onboarding using self-sovereign identity and distributed ledger,&#8221;]]></source>
<year>2018</year>
<page-range>1129-36</page-range><publisher-name><![CDATA[iThings/GreenCom/CPSCom/SmartData/Blockchain/CIT]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B60">
<label>[60]</label><nlm-citation citation-type="">
<collab>Sovrin Foundation</collab>
<source><![CDATA[Sovrin governance framework - Sovrin]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B61">
<label>[61]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stokkink]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Pouwelse]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8216;&#8217;Deployment of a blockchain-based self-sovereign identity,&#8221;]]></source>
<year>2018</year>
<page-range>2018</page-range><publisher-name><![CDATA[iThings/GreenCom/CPSCom/SmartData/Blockchain/CIT]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B62">
<label>[62]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[De Filippi]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;Self-sovereign identity in a globalized world: Credentials-based identity systems as a driver for economic inclusion,&#8221;]]></article-title>
<source><![CDATA[Front. Blockchain]]></source>
<year>2020</year>
<volume>2</volume>
<numero>00028</numero>
<issue>00028</issue>
</nlm-citation>
</ref>
<ref id="B63">
<label>[63]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Su]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Is China the world&#8217;s blockchain leader? Evidence, evolution and outlook of China&#8217;s blockchain research]]></article-title>
<source><![CDATA[J. Clean. Prod]]></source>
<year></year>
<volume>264</volume>
<numero>121742</numero>
<issue>121742</issue>
</nlm-citation>
</ref>
<ref id="B64">
<label>[64]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Windley]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Sovrin: A protocol and token for self-sovereign identity and decentralized trust]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B65">
<label>[65]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[A blockchain based identity management system considering reputation]]></source>
<year>2019</year>
<conf-name><![CDATA[ 2019 2nd Int. Conf. Info. Syst. Comp. Aided Ed. (ICISCAE)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>32-6</page-range></nlm-citation>
</ref>
<ref id="B66">
<label>[66]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Badr]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[A survey on blockchain-based identity management systems for the Internet of Things]]></source>
<year>2018</year>
<page-range>1568-73</page-range><publisher-name><![CDATA[iThings/GreenCom/CPSCom/SmartData/Blockchain/CIT]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
