The research community and digital sector are currently engaged in the development of diverse services within the metaverse ecosystems.Conversely,as concerns about safeguarding personal privacy mount,individuals antic...
Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperabi...
supported by the project STRIDE included in the Spoke 5(Cryptography and Distributed Systems Security)of the Re-search and Innovation Program PE00000014-H73C22000880001,“SE-curity and RIghts in the CyberSpace(SERICS)”,under the National Recovery and Resilience Plan,funded by the European Union,NextGen-erationEU.
The interest in Self-Sovereign Identity(SSI)in research,industry,and governments is rapidly increasing.SSI is a paradigm where users hold their identity and credentials issued by authorized entities.SSI is revolutioni...
supported by the Natural Science Foundation of Guangdong Province,Grant No.2023A1515030221.
We construct a sovereign default network by employing high-dimensional vector autoregressions obtained by analyzing connectedness in sovereign credit default swap markets.We develop four measures of centrality,namely,...
The underlying literature hypothesises and provides randomised evidence for the positive impact of promoting the broad-based inclusion,empowerment,and representation of women on regional ecosystems.This study seeks to...
The voting system of the United Nations General Assembly is the core power of the “International Parliament”. According to the Charter of the United Nations, the United Nations General Assembly focuses on the sovere...
This commentary shows the exponential growth of digital health and the accompanying explosion of health data.It discusses three major shifts in the global health landscape.The first will be the move of the big tech co...
Identity management has been ripe for disruption over the past few years due to recurring incidents of data breaches that have led to personal information leaks and identity theft.The rise of blockchain technology has...