[1] Phipps, J., 6 Best Identity & Access Management (IAM) Solutions for2023, https://www.esecurityplanet.com/products/ best-iam-software/, accessed on January 1, 2024. [2] Jayabalan, J. and Jeyanthi, N.Scalable Blockchain Model using Off-Chain IPFS Storage for Healthcare Data Security and Privacy. Journal of Parallel and Distributed Computing, vol. 164, pp.152-167, 2022. [3] Jayapriya, J. and Jeyanthi, N.Distributed Consensus Protocols and Algorithms. In Essential Enterprise Blockchain Concepts and Applications, Auerbach Publications, CRC press, Taylor & Francis, pp. 15-38, 2021. [4] Jayabalan, J. and Jeyanthi, N. A Study on Distributed Consensus Protocols and Algorithms: The Backbone of Blockchain Networks. In2021 International Conference on Computer Communication and Informatics (ICCCI), IEEE, pp. 1-10, 2021. [5] Jacobovitz O.Blockchain for Identity Management. The Lynne and William Frankel Center for Computer Science Department of Computer Science. Ben-Gurion University, Beer Sheva, vol. 1, pp. 9, 2016. [6] Uhlmann S.Reducing Counterfeit Products with Blockchains. University of Zurich, 2017. [7] Vruddhula S.Application of on-Dose Identification and Blockchain to Prevent Drug Counterfeiting. Pathogens and global health, vol. 112, no. 4, pp. 161, 2018. [8] Faber B., Michelet G., Weidmann N., Mukkamala R.R., andVatrapu R.BPDIMS: A Blockchain-Based Personal Data and Identity Management System. In The 52nd Hawaii International Conference on System Sciences, pp. 6855-6864, 2019. [9] Tang F., Ma S., Xiang Y., andLin C.An Efficient Authentication Scheme for Blockchain-Based Electronic Health Records. IEEE access, vol. 7, pp. 41678-41689, 2019. [10] Shamshad S., Mahmood K., Kumari S., andChen C.M.A Secure Blockchain-Based E-Health Records Storage and Sharing Scheme. Journal of Information Security and Applications, vol. 55, pp. 102590, 2020. [11] Malhotra D., Saini P., andSingh A.K.How Blockchain Can Automate KYC: Systematic Review. Wireless Personal Communications, vol. 122, no. 2, pp. 1987-2021, 2022. [12] Lee W.M. using the MetaMask Crypto-Wallet. In Beginning Ethereum Smart Contracts Programming: With Examples in Python, Solidity, and JavaScript, Berkeley, CA: Apress, pp. 111-144, 2023. [13] Wang Q., Li R., Wang Q., Chen S., Ryan M., andHardjono, T. Exploring Web3 from the View of Blockchain. ArXiv Preprint ArXiv:2206.08821, 2022. [14] Mahlaba J., Mishra A.K., Puthal D., andSharma P.K.Blockchain-Based Sensitive Document Storage to Mitigate Corruptions. IEEE Transactions on Engineering Management, 2022. [15] Das M., Tao X., Liu Y., andCheng J.C.A Blockchain-Based Integrated Document Management Framework for Construction Applications. Automation in Construction, vol. 133, pp. 104001, 2022. [16] Jeyanthi N., Chatterjee S., Srujana E.D., andThandeeswaran R.Novel Authentication Mechanism using Blockchain. SPAST Abstracts, vol. 1, no. 01, 2021. |