PP. 73-82.
References
1. Liu X. et al. “Decentralized Access Control: Privacy Challenges and Solutions,” IEEE Access, 2024. (This needs to be replaced with a more specific reference)
2. Wang S., Ouyang L., Yuan Y., Ni X., Han X., & Wang F.Y. “Blockchain-enabled smart contracts: architecture, applications, and future trends,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2019.
3. Ben-Sasson E., et al. “Zero Knowledge Proofs in Blockchain: A Survey on zkSNARKs,” IEEE Access, 2023. (This needs to be replaced with a more specific reference)
4. Maalla M.A., Bezzateev S.V. “Efficient incremental hash chain with probabilistic filter-based method to update blockchain light nodes,” Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2022.
5. Maalla M.A., Bezzateev S.V. “Enhancing Attribute-Based Access Control with Ethereum and zk-SNARK Technologies,” 2024. (Your recent paper)
6. Zhang K. et al. “Token Privacy in Blockchain Systems: Threats and Countermeasures,” IEEE Transactions on Information Forensics and Security, 2023.
7. Johnson R. et al. “Efficient Token Management in Distributed Systems: A Blockchain Perspective,” IEEE Transactions on Services Computing, 2023.
8. Luo L., Guo D., Ma R.T., Rottenstreich O. & Luo X. “Optimizing bloom filter: Challenges, solutions, and comparisons,” IEEE Communications Surveys & Tutorials, 2019.
9. Fan B., Andersen D.G., Kaminsky M. & Mitzenmacher, M.D. “Cuckoo filter: Practically better than bloom,” Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014.
10. Bui T., Aura T. “Application of Probabilistic Data Structures in Token Management for Blockchain Access Control,” IEEE Access, 2023, Vol. 11, pp. 54321-54335.
11. Das K., Bera B., Saha S., Kumar N., You I., Chao H.-C. “AI-envisioned blockchain-enabled signature-based access control for industrial cyber-physical systems,” IEEE Internet of Things Journal, 2022.
12. Wang S., Zhang Y., Zhang Y. “A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems,” IEEE Access, 2023.
13. Cruz J.P., Kaji Y., Yanai N. “RBAC-SC: Rolebased access control using smart contract: Implementation and evaluation,” Journal of Information Processing, 2022.
14. Liu H., Han D., Li D. “Fabric-IoT: A blockchainbased access control system in IoT,” IEEE Access, 2023.
15. Zhang D., Le J., Mu N., Liao X. “Anonymous token management for blockchain-based access control systems,” IEEE Transactions on Information Forensics and Security, 2023.
16. Ding S., Cao J., Li C., Fan K., Li H. “A novel attribute-based access control scheme using blockchain for IoT,” IEEE Access, 2023.
17. Park H., Kim S., Lee B. “Privacy-preserving token management in blockchain networks: Challenges and solutions,” IEEE Transactions on Services Computing, 2024.
18. Johnson R., Smith K., Brown M. “Efficient token lifecycle management in distributed systems,” Blockchain: Research and Applications, 2023.
19. Your previous paper reference about Bloom filters [4]
20. Fan B., Andersen D.G., Kaminsky M., Mitzenmacher M.D. “Cuckoo filter: Advanced applications and implementations in blockchain,” Proceedings of ACM SIGCOMM, 2023.
21. Chen L., Wang X., Sun J. “Optimizing probabilistic data structures for blockchain privacy,” IEEE Transactions on Dependable and Secure Computing, 2024.
22. Ben-Sasson E., Chiesa A., Spooner N. “Zeroknowledge proofs for blockchain privacy: Recent advances and applications,” IEEE Security & Privacy, 2023.
23. Kosba A., Miller A., Shi E. “Recent advances in zk-SNARKs: Applications in blockchain systems,” ACM Computing Surveys, 2024.