We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 7,743 results
  1. Are Micro-Credentials Valuable for Students? Perspective on Verifiable Digital Credentials

    Higher education institutions are investing more and investigating digital credentials as proof of learning upon completion of learning offerings,...

    Padmasheela Kiiskilä, Arttu Kukkonen, Henri Pirkkalainen in SN Computer Science
    Article Open access 29 April 2023
  2. Novel blockchain-based framework to publish, verify, and store digital academic credentials of universities

    Blockchain is the technology of choice to create cryptocurrency and bitcoins through the maintenance of immutable distributed ledgers in multiple...

    Tara Chandra, Mandeep Kaur, ... Sudhanshu Maurya in International Journal of Information Technology
    Article 06 May 2024
  3. Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials

    Industrial data trading can considerably enhance the economic and social value of abundant data resources. However, traditional data trading models...

    Junli Fang, Tao Feng, ... Ye Lu in Journal of Cloud Computing
    Article Open access 02 February 2024
  4. Micro-credentials in leveraging emergency remote teaching: the relationship between novice users’ insights and identity in Malaysia

    Micro-credentials have gained much popularity in recent years, and their popularity has skyrocketed due to emergency remote teaching instigated by...

    Jeya Amantha Kumar, Rachel Jasmine Richard, ... Kevin Lowrence in International Journal of Educational Technology in Higher Education
    Article Open access 01 April 2022
  5. A systematic review of the opportunities and challenges of micro-credentials for multiple stakeholders: learners, employers, higher education institutions and government

    Micro-credentials are gaining traction as viable vehicles for rapid upskilling of the workforce in the twenty-first century and potential pathways...

    Soovendran Varadarajan, Joyce Hwee Ling Koh, Ben Kei Daniel in International Journal of Educational Technology in Higher Education
    Article Open access 28 February 2023
  6. Privacy-Preserving Post-quantum Credentials for Digital Payments

    Digital payments and decentralized systems enable new financial products and services for users. A core challenge stems from the need to protect...
    Raza Ali Kazmi, Duc-Phong Le, Cyrus Minwalla in Financial Cryptography and Data Security. FC 2022 International Workshops
    Conference paper 2023
  7. Toward just and equitable micro-credentials: an Australian perspective

    The current historic COVID-19 Pandemic moment has thrown into sharp relief the need for flexible and rigorous higher education that meets upskilling...

    Article Open access 01 June 2022
  8. SoK: Anonymous Credentials

    Anonymous credentials are a powerful tool for making assertions about identity while maintaining privacy and have been the subject of study for many...
    Saqib A. Kakvi, Keith M. Martin, ... Elizabeth A. Quaglia in Security Standardisation Research
    Conference paper 2023
  9. Distributed access control for information-centric networking architectures using verifiable credentials

    Information-Centric Networking (ICN) is an emerging paradigm that allows users to retrieve content items securely, independently of their location....

    Bander Alzahrani, Nikos Fotiou, ... Khalid Alsubhi in International Journal of Information Security
    Article 07 December 2022
  10. Alternative Digital Credentials—UAE’s First Adopters’ Quality Assurance Model and Case Study

    As the leading applied higher education institution in the United Arab Emirates, the Higher Colleges of Technology is engaging Alternative Digital...
    Samar A. El-Farra, Jihad M. Mohaidat, ... Abdullatif M. Alshamsi in Artificial Intelligence in Education: Emerging Technologies, Models and Applications
    Conference paper 2022
  11. Implementation of micro-credentials in higher education: A systematic literature review

    Micro-credential (MC) is an innovative and disruptive technology-based learning model. In higher education (HE), MCs are typically certified in the...

    Kamrul Ahsan, Suraiyah Akbar, ... Muhammad Dan-Asabe Abdulrahman in Education and Information Technologies
    Article Open access 30 March 2023
  12. Cryptographic Credentials

    Living reference work entry 2023
  13. Selective Delegation of Attributes in Mercurial Signature Credentials

    Anonymous credential schemes enable service providers to verify information that a credential holder willingly discloses, without needing any further...
    Colin Putman, Keith M. Martin in Cryptography and Coding
    Conference paper 2024
  14. Privacy-Preserving Educational Credentials Management Based on Decentralized Identity and Zero-Knowledge Proof

    Educational credentials are an important part of the education ecosystem. However, these credentials often exist in the form of traditional paper...
    Tianmin **ong, Zhao Zhang, Cheqin **g in Computer Science and Education. Computer Science and Technology
    Conference paper 2024
  15. Unlinkable Delegation of WebAuthn Credentials

    The W3C’s WebAuthn standard employs digital signatures to offer phishing protection and unlinkability on the web using authenticators which manage...
    Nick Frymann, Daniel Gardham, Mark Manulis in Computer Security – ESORICS 2022
    Conference paper 2022
  16. Blockchain in E-Learning Platform to Enhance Trustworthy and Sharing of Micro-credentials

    Blockchain is a disruptive technology and interest in its adoption is growing across many market sectors in Industry 4.0. However, the blockchain...
    Alessandro Bigiotti, Maria Paola Francesca Bottoni, Giacomo Nalli in Advanced Information Systems Engineering Workshops
    Conference paper 2024
  17. Towards Smart Contract-Based Verification of Anonymous Credentials

    Smart contracts often need to verify identity-related information of their users. However, such information is typically confidential, and its...
    Robert Muth, Tarek Galal, ... Florian Tschorsch in Financial Cryptography and Data Security. FC 2022 International Workshops
    Conference paper 2023
  18. Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing

    During the pandemic, the limited functionality of existing privacy-preserving contact tracing systems highlights the need for new designs. Wang et...
    Pengfei Wang, **angyu Su, ... Keisuke Tanaka in Applied Cryptography and Network Security
    Conference paper 2024
  19. When the push and pull factors in digital educational resources backfire: the role of digital leader in digital educational resources usage

    The study investigated the impact of digital leadership on teachers’ usage of digital educational resources (DERs). The study collected data from...

    Kwadwo Asante, Petr Novak in Education and Information Technologies
    Article Open access 07 August 2023
Did you find what you were looking for? Share feedback.