{"id":"https://openalex.org/W4386257487","doi":"https://doi.org/10.1109/icit58056.2023.10226017","title":"Digital Certificate Validation Using Blockchain: A Survey","display_name":"Digital Certificate Validation Using Blockchain: A Survey","publication_year":2023,"publication_date":"2023-08-09","ids":{"openalex":"https://openalex.org/W4386257487","doi":"https://doi.org/10.1109/icit58056.2023.10226017"},"language":"en","primary_location":{"id":"doi:10.1109/icit58056.2023.10226017","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icit58056.2023.10226017","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Information Technology (ICIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092712142","display_name":"Yazan Abu Hammoudeh","orcid":null},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Yazan Abu Hammoudeh","raw_affiliation_strings":["University of Jordan,Department of Computer Science,Amman,Jordan","Department of Computer Science, University of Jordan, Amman, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Jordan,Department of Computer Science,Amman,Jordan","institution_ids":["https://openalex.org/I114972647"]},{"raw_affiliation_string":"Department of Computer Science, University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044672943","display_name":"Mohammad Qatawneh","orcid":"https://orcid.org/0000-0002-4917-3418"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mohammad Qatawneh","raw_affiliation_strings":["University of Jordan,Department of Computer Science,Amman,Jordan","Department of Computer Science, University of Jordan, Amman, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Jordan,Department of Computer Science,Amman,Jordan","institution_ids":["https://openalex.org/I114972647"]},{"raw_affiliation_string":"Department of Computer Science, University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077336855","display_name":"Orieb AbuAlghanam","orcid":null},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Orieb AbuAlghanam","raw_affiliation_strings":["University of Jordan,Department of Computer Science,Amman,Jordan","Department of Computer Science, University of Jordan, Amman, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Jordan,Department of Computer Science,Amman,Jordan","institution_ids":["https://openalex.org/I114972647"]},{"raw_affiliation_string":"Department of Computer Science, University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089858932","display_name":"Mohammed Amin Almaiah","orcid":"https://orcid.org/0000-0002-0246-4365"},"institutions":[{"id":"https://openalex.org/I4626487","display_name":"King Faisal University","ror":"https://ror.org/00dn43547","country_code":"SA","type":"education","lineage":["https://openalex.org/I4626487"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammed A Almaiah","raw_affiliation_strings":["King Faisal University,Department of Computer Networks,Al-Ahsa,Saudi Arabia","Department of Computer Networks, King Faisal University, Al-Ahsa, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"King Faisal University,Department of Computer Networks,Al-Ahsa,Saudi Arabia","institution_ids":["https://openalex.org/I4626487"]},{"raw_affiliation_string":"Department of Computer Networks, King Faisal University, Al-Ahsa, Saudi Arabia","institution_ids":["https://openalex.org/I4626487"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5092712142"],"corresponding_institution_ids":["https://openalex.org/I114972647"],"apc_list":null,"apc_paid":null,"fwci":5.3725,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.95935787,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"506","last_page":"510"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14319","display_name":"Currency Recognition and Detection","score":0.9465000033378601,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.914900004863739,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.8826613426208496},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7522454261779785},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.6234144568443298},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6143314242362976},{"id":"https://openalex.org/keywords/immutability","display_name":"Immutability","score":0.588233470916748},{"id":"https://openalex.org/keywords/public-key-certificate","display_name":"Public key certificate","score":0.5654791593551636},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.5615198612213135},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.5556113719940186},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.5090402960777283},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.49666911363601685},{"id":"https://openalex.org/keywords/counterfeit","display_name":"Counterfeit","score":0.44511401653289795},{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.4427470862865448},{"id":"https://openalex.org/keywords/certificate-authority","display_name":"Certificate authority","score":0.4323716163635254},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.4207392930984497},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.29266542196273804},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.10361781716346741},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.10165578126907349},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.0947401225566864}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.8826613426208496},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7522454261779785},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.6234144568443298},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6143314242362976},{"id":"https://openalex.org/C2776126399","wikidata":"https://www.wikidata.org/wiki/Q3942906","display_name":"Immutability","level":3,"score":0.588233470916748},{"id":"https://openalex.org/C167529545","wikidata":"https://www.wikidata.org/wiki/Q274758","display_name":"Public key certificate","level":4,"score":0.5654791593551636},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.5615198612213135},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.5556113719940186},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.5090402960777283},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.49666911363601685},{"id":"https://openalex.org/C2779356469","wikidata":"https://www.wikidata.org/wiki/Q502918","display_name":"Counterfeit","level":2,"score":0.44511401653289795},{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.4427470862865448},{"id":"https://openalex.org/C93636275","wikidata":"https://www.wikidata.org/wiki/Q196776","display_name":"Certificate authority","level":4,"score":0.4323716163635254},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.4207392930984497},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.29266542196273804},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.10361781716346741},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.10165578126907349},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0947401225566864},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icit58056.2023.10226017","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icit58056.2023.10226017","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Information Technology (ICIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2754529701","https://openalex.org/W2800135730","https://openalex.org/W2808224912","https://openalex.org/W2810807736","https://openalex.org/W2914443561","https://openalex.org/W3088597519","https://openalex.org/W3151033942","https://openalex.org/W3183358137","https://openalex.org/W3184093817","https://openalex.org/W3184600775","https://openalex.org/W3185428910","https://openalex.org/W3186703809","https://openalex.org/W4211264753","https://openalex.org/W4214693134","https://openalex.org/W4231741614","https://openalex.org/W4283822944","https://openalex.org/W4309770812","https://openalex.org/W4319997207"],"related_works":["https://openalex.org/W2111816087","https://openalex.org/W2024386934","https://openalex.org/W2376373997","https://openalex.org/W2994213367","https://openalex.org/W1709311896","https://openalex.org/W2369694906","https://openalex.org/W2188945435","https://openalex.org/W4244357787","https://openalex.org/W4313288832","https://openalex.org/W2378028794"],"abstract_inverted_index":{"The":[0],"advantages":[1],"of":[2,28,89,122,134,147,156],"blockchain":[3,14,108],"technology":[4,109,114,150],"include":[5],"decentralization,":[6],"distribution,":[7],"transparency,":[8],"and":[9,21,120,141],"immutability.":[10],"These":[11],"attributes":[12],"make":[13],"(BC)":[15],"a":[16,90,112],"good":[17],"solution":[18],"to":[19,54,69,93,139],"prevent":[20],"reduce":[22],"the":[23,46,51,74,87,95,103,116,132,143],"counterfeiting":[24],"in":[25,102,115,151],"many":[26],"domain":[27],"our":[29],"life.":[30],"Personal":[31],"official":[32],"digital":[33,157],"certificates":[34,59,79],"such":[35,78,85],"as":[36,86,98,100,124,126],"university":[37],"certificate,":[38],"passport,":[39],"birth":[40],"certificates,":[41],"identification":[42],"cards,":[43],"etc.":[44],"are":[45],"most":[47],"significant":[48],"documents":[49],"that":[50],"government":[52],"offer":[53],"citizens.":[55],"However,":[56],"fake":[57],"personal":[58],"can":[60],"be":[61],"easily":[62],"issued":[63],"by":[64],"certain":[65],"people":[66],"or":[67,82,153],"entities":[68],"obtain":[70],"illegal":[71],"services,":[72],"because":[73],"procedures":[75],"for":[76,130],"issuing":[77],"contain":[80],"security":[81],"operational":[83],"vulnerabilities,":[84],"possibility":[88],"third":[91],"party":[92],"modify":[94],"certificate":[96],"information,":[97],"well":[99,125],"weaknesses":[101],"certification":[104],"verification":[105],"procedures.":[106],"Recently,":[107],"has":[110],"become":[111],"crucial":[113],"fight":[117],"against":[118],"fraud":[119],"abuse":[121],"documents,":[123],"an":[127],"applicable":[128],"method":[129],"verifying":[131],"validity":[133],"documents.":[135],"This":[136],"study":[137],"attempts":[138],"explore":[140],"discuss":[142],"up-to-date":[144],"research":[145],"studies":[146],"using":[148],"Blockchain":[149],"preventing":[152],"reducing":[154],"counterfeit":[155],"certificates.":[158]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6}],"updated_date":"2026-04-26T08:31:28.666265","created_date":"2025-10-10T00:00:00"}
