<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Applications in the Automotive Sector of the Self-Sovereign Digital Identity Model on Permissioned Blockchain</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Marta Lucrezia Alessandria</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Rome Tor Vergata</institution>
          ,
          <addr-line>Rome</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <fpage>84</fpage>
      <lpage>90</lpage>
      <abstract>
        <p>This paper develops a digital Driver Identification Certificate (CID) on a Multichain-based blockchain platform, aiming to provide a secure and decentralized solution for managing automotive identities. It enhances transparency and eficiency compared to traditional methods. The analysis covers benefits like reduced fraud and increased eficiency, while also addressing challenges such as complex key management and integration issues.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Self Sovereign Identity</kwd>
        <kwd>car's digital passport</kwd>
        <kwd>Digital CID</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        This paper examines how blockchain technology can
address issues like inconsistent data and privacy in the
automotive industry [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1, 2, 3, 4</xref>
        ]. This is due to the progress
of electronic devices [
        <xref ref-type="bibr" rid="ref10 ref5 ref6 ref7 ref8 ref9">5, 6, 7, 8, 9, 10</xref>
        ]. It proposes a digital
solution for car accident management, replacing the
manual amicable accident statement (CID) with a smartphone
application linked to a blockchain managed by insurance
companies. This system automatically reports incidents and
details damage, improving repair eficiency.
      </p>
      <p>The paper also explores integrating Self-Sovereign
Identity (SSI) and a digital car passport (PDA). SSI ensures driver
identity authenticity, while the PDA, integrated with SSI,
tracks car damages, repairs, and workshop details.</p>
      <p>The work includes software design for a digital CID and
demonstrates the PDA on the MultiChain blockchain. It is
structured into five chapters covering blockchain
fundamentals, project proposal, implementation on MultiChain, and
conclusions. Overall, the paper highlights how blockchain
and SSI can enhance car accident management by improving
eficiency, transparency, and traceability.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Blockchain</title>
      <p>
        Blockchain emerged in 2008 with the white paper "Bitcoin: A
Peer-to-Peer Electronic Cash System" by Satoshi Nakamoto,
proposing an electronic payment system without financial
intermediaries, ensuring authenticity, confidentiality,
nonrepudiation, prevention of double spending, and reduction
of intermediation costs [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The solution is a distributed
ledger based on complex cryptographic exercises for adding
new blocks, each containing transactions verified through
peer-to-peer timestamps [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ]. The authenticity and
conifdentiality data are ensured by the use of asymmetric
cryptographic keys.
      </p>
      <sec id="sec-2-1">
        <title>2.1. Cryptography: Hash Functions and</title>
      </sec>
      <sec id="sec-2-2">
        <title>Asymmetric Keys</title>
        <p>Cryptography uses algorithms and keys to encode
messages, ensuring confidentiality, authenticity, integrity, and
non-repudiation. Hash algorithms generate a unique string
(digest) from any input, used to verify the integrity of
information. However, they can present collisions, where two
diferent texts produce the same hash.</p>
        <p>
          Asymmetric cryptographic algorithms, such as RSA, use
a pair of keys (public and private) to encrypt and decrypt
data [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. RSA, proposed by Difie and Hellman and later
by Rivest, Shamir, and Adleman, ensures that a private key
remains secret despite the public key’s knowledge.
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>2.2. Applications: Digital Signature</title>
        <p>The digital signature uses asymmetric algorithms to
ensure authenticity and integrity. The National Institute of
Standards and Technology (NIST) proposed the Digital
Signature Algorithm (DSA) as a standard. The digital
signature includes the document’s fingerprint, encoded with the
sender’s private key, and the public key accompanied by a
certificate issued by a certification authority (CA), verifying
the sender’s identity. The recipient uses the public key to
decrypt and verify the document’s integrity.</p>
      </sec>
      <sec id="sec-2-4">
        <title>2.3. Blockchain Architecture</title>
        <p>
          Blockchain is a distributed ledger consisting of a chain of
linked blocks, each containing data like transactions or
smart contracts. Each participant in the network maintains
a current copy of this chain [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. When a block fills, it is
sealed with a cryptographic hash, and the hash is included
in the next block, ensuring security and immutability.
Transactions use UTXO (unspent transaction output) to prevent
double spending, and each transaction is timestamped and
confirmed after being added to at least six subsequent blocks.
Blockchain operates through a peer-to-peer network, with
nodes validating transactions and miners solving Proof of
Work (PoW) to add blocks, earning cryptocurrency rewards.
For instance, Bitcoin miners receive rewards that halve
every four years, controlling inflation and enhancing Bitcoin’s
value.
        </p>
      </sec>
      <sec id="sec-2-5">
        <title>2.4. Operation: Consensus Algorithms</title>
        <p>Consensus algorithms like Proof of Work (PoW) are crucial
for blockchain. Nodes manage and record blocks,
broadcasting transactions for network-wide validation. This includes
checking syntax, block size, and fees. Valid transactions
enter the Transaction Pool, awaiting block inclusion. In
Bitcoin, miners solve PoW problems by finding hashes below
a set value, preventing Sybil attacks, and validating blocks
for rewards.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Self Sovereign Identity</title>
      <p>Historically, digital identity management relied on
centralized systems or third-party Identity Providers, where central
authorities issued identifiers like driver’s licenses or birth
certificates, limiting user control. This approach had issues
such as managing multiple accounts, corporate control over
personal data, vulnerabilities to theft and privacy breaches,
risks of service obsolescence, high costs and complexity,
and increased cybersecurity threats.</p>
      <p>
        The Self-Sovereign Identity (SSI) model ofers a
decentralized alternative, using blockchain and cryptography to
provide users full control over their digital identities. With
Verifiable Credentials (VCs) and Decentralized Identifiers
(DIDs), SSI enhances security, privacy, and user control by
allowing individuals to prove attributes like age without
revealing sensitive information. This is particularly important
in the case of video applications [
        <xref ref-type="bibr" rid="ref16 ref17 ref18">16, 17, 18</xref>
        ].
      </p>
      <sec id="sec-3-1">
        <title>3.1. Involved Institutional Bodies</title>
        <p>In Europe, blockchain technology is promoted and managed
by several institutional bodies. The European Blockchain
Partnership (EBP), formed in 2018 by 27 EU member states,
Norway, and Liechtenstein, aids the European
Commission in developing the European Blockchain Services
Infrastructure (EBSI). EBSI, supported by the Connecting Europe
Facility (CEF) and the Digital Europe Programme (DEP),
aims to modernize digital public services and leverage the
digital single market. EBSI provides cross-border public
services through a network of blockchain nodes, ensuring
transparency and security. The European regulation eIDAS
(Regulation (EU) No 910/2014) standardizes electronic
identification and trust services, enabling digital documents to
replace paper with the same legal value across the EU.
3.2. Regulatory Framework
eIDAS requires that all member states recognize electronic
signatures that comply with the standards set by the
regulation, thereby facilitating cross-border digital transactions. It
has been implemented in various digital authentication
systems across Europe, such as SPID in Italy and Signaturgesetz
in Austria.</p>
        <p>On June 3, 2021, the European Commission proposed
a revision of eIDAS to create a framework supporting a
European Digital Identity, including the development of a
pan-European "Digital Wallet." The proposal aims to
promote a more decentralized governance model, also
considering the adoption of digital identity systems based on the
Self-Sovereign Identity (SSI) model.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.3. SSI Architecture</title>
        <p>
          Self-Sovereign Identity (SSI) empowers users to manage
their own digital identities without intermediaries or
central authorities. SSI emphasizes user autonomy, control
over privacy, and direct access to personal data, ensuring
transparency, portability, and protection [
          <xref ref-type="bibr" rid="ref19 ref20 ref21">19, 20, 21</xref>
          ]. The
model aims to create secure digital identities while
preventing unauthorized access. Influenced by historical events
like the Holocaust, SSI prioritizes decentralization to avoid
abuses of centralized information. Its architecture relies
on Verifiable Credentials (VC) and Decentralized Identifiers
(DID)[
          <xref ref-type="bibr" rid="ref22 ref23 ref24">22, 23, 24</xref>
          ]. VCs are digital proofs of identity attributes,
and DIDs are unique, cryptographically verified identifiers.
This system ensures that only authorized individuals can
update identity information, preserving data integrity and
security. The architecture of a DID is as follows: The
Verifiable Data Registry (VDR), often based on blockchain, is
where DIDs and DID Documents are registered. This
distributed ledger ensures that all changes are traceable and
immutable, providing an unprecedented level of transparency
and security.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. SSI and Blockchain Applications</title>
      <p>for the Automotive Sector: The</p>
    </sec>
    <sec id="sec-5">
      <title>Digital CID</title>
      <p>The work aims to identify an eficient way to manage data
and communications after a road accident, using blockchain
to prevent fraud and improve the transfer of information to
insurance companies. It analyzes current critical issues and
proposes the use of SSI (Self-Sovereign Identity) credentials
and a digital car passport, enabling the digital completion
of the CID (Friendly Accident Statement) through a mobile
app. The following table summarizes the scenarios and use
cases we are going to analyze.</p>
      <sec id="sec-5-1">
        <title>4.1. Problem Statement</title>
        <p>The main issues after an accident include:
• The exchange of large amounts of personal and
sensitive data.
• Fraud risks (e.g., false identity, falsification of
accident details).
• Long times to obtain funds and repairs.</p>
        <p>• Dificulties in tracking accidents and repairs.</p>
        <p>The proposed solution involves a private blockchain
managed by various insurance companies. This would allow for
the digital completion of the CID, using the digital car
passport to record accidents and repairs, and Verifiable
Credentials (VC) to prevent fraud. Two main scenarios post-road
accidents were analyzed: a traditional one and an innovative
one utilizing digital technologies.</p>
      </sec>
      <sec id="sec-5-2">
        <title>4.2. Classical Scenario</title>
        <p>In a typical accident, two drivers:
• Exchange Information: Verify identities and
insurance, often on paper or via phone.
• Determine Fault: If no injuries, they establish
fault and complete the CID. If cooperative, they
submit the CID to insurers; if not, minimal details are
shared.
• Insurance Involvement: Both insurers investigate
the accident details to determine fault and assess
damages.
• Compensation: The driver not at fault waits for
insurance payout, often handling repairs
independently due to delays.</p>
      </sec>
      <sec id="sec-5-3">
        <title>4.3. Innovative Scenarios</title>
        <p>Thanks to SSI and the car’s digital passport the scenario
changes. In fact, I take out an insurance policy with a certain
insurance company; this company makes me install an app
on my cell phone to use in case of a claim. Let’s take a closer
look at how this app works after the accident, referring to
two possible situations 1) and 2):</p>
        <p>Scenario 1
Assume that:
1. Both drivers possess SSI (VC) credentials
approximately:
- their identity,
- their driver’s license,
- their car’s digital passport;
2. Both have installed the app related to incident
management;</p>
        <p>3. Both have installed the black box on their car (Same
consequence of having the car’s digital passport);
4. Both want to collaborate.</p>
        <p>Steps:
a. Both drivers (who probably have insurance with
different agencies) open their respective claims management
app: digital CID compilation begins;
b. Both import their SSI credentials listed earlier;
c. Both enter the SSI credentials of the other driver
(exchange of SSI between two holders);</p>
        <p>d. Both of them, by mutual agreement, manually enter
the description of the accident dynamics, the time, the type
of damages reported by the vehicle and all the other info
that are typically required in a paper CID and that are not
contained in the VCs already imported before;</p>
        <p>e. Photos or even a short video of the vehicles status are
taken. The photos are somehow authenticated by the app
itself, which then attaches them to the digital CID.
f. The digital CID has been completed:
o The APP is connected to an insurance company’s own
blockchain, so the digital CID (or its hash) is put on the
blockchain, so that it is unambiguous and unrecoverable.
In addition, all info related to damages reported by cars
(including any photos and videos) are linked to the digital
passport of the car to update it.</p>
        <p>o The app automatically sends a copy of the digital CID
to the certified email address of the relevant insurance
company, saved by default;</p>
        <p>At this point the accident report has been digitally
submitted through the app provided: both insurance companies
are aware of the accident and of the information recorded by
the digital passport (certain) and by the individual drivers
(to be verified)!</p>
        <p>g. Once the complaint has been made, the engineers
(the persons in charge) of each insurance company will
be able as soon as possible to establish who is entitled to
compensation both with the information they already have
(digital CID), and with any information acquired following
an inspection (personal or with drones) on the site of the
accident, thanks to which they will verify the place of the
accident: the horizontal and vertical road signs, the state of
wear of the asphalt, potholes, etc.</p>
        <p>h. After identifying the eligible motorist, the insurer that
has contracted repair centers (garages) and that support SSI
technologies will issue a VC to the driver to confirm the
vehicle’s eligibility for a repair paid for by the insurance
company, so that the driver can directly present it to that
garage and immediately receive the repairs he or she needs.</p>
        <p>i. In addition, upon completion of the repair, the driver
will receive a credential showing the repair, the warranty,
and the fact that the garage was an authorized repairer for
the car. This information would be useful to the driver when
they sell the vehicle in the future, as they will have kept
track of all the repairs done on their car. Therefore, all this
info will go to update the SSI credentials referred to the
car’s digital passport.</p>
        <p>Scenario 2
Assume that:
1. Only one driver has SSI credentials and digital car
passport.</p>
        <p>2. One or both have black box installed on their car.
3. One does not want to cooperate or even runs away
after the accident.</p>
        <p>Steps:</p>
        <p>In this case the previous steps are carried out by the
single person who has SSI credentials and instead of step c)
it will be enough to enter the license plate number of the
uncooperative driver possibly attaching a photo.</p>
        <p>The CID filled in by the individual driver on the app
will be published on the blockchain and reported to the
company via certified mail. At this point it will be up to
the individual company to trace the data of the other driver
from the license plate, identify his insurance company and
get in touch to establish the true dynamics of the accident,
establish whose fault it is and the damage caused by the
cars.</p>
        <p>Obviously, if the other car has the black box, the process
of verifying the dynamics of the accident is much simplified!
Therefore, the time is shortened.</p>
      </sec>
      <sec id="sec-5-4">
        <title>4.4. Digital CID Structure</title>
        <p>CID Information with SSI:
1. Date and time
2. Location (GPS, black box)
3. Injuries and authorities involved
4. Material damage to third-party property (optional
photo upload)
5. Witnesses –&gt; entry via SSI identification code
6. Insurance policyholder –&gt; SSI
7. Vehicle –&gt; SSI
8. Insurance company –&gt; SSI
9. Driver –&gt; SSI
10. Impact on own vehicle (drawing with clickable
impact points)
11. List of visible damages (dropdown list)
12. List of accident circumstances (dropdown list)
13. Accident dynamics (drawing with 2D-3D
options/photo/video upload)
14. Observations
15. Signature –&gt; SSI-C (signature, fingerprint, etc.)
As we will see, the required information can be further
reduced when items 10, 11, 12, and 13 are replaced with
photos, videos, and pre-set responses based on known and
listable accident dynamics. Next, we will delve into the
dynamics of digital CID completion through a mobile app
after an accident occurs.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. Digital CID Compilation and Blockchain Entry</title>
      <p>1. Personal Identification: The first information the
application will require is the identity of the user
using the app. This can be achieved through existing
technologies like IMEI code, biometric factors, or
two-factor authentication (2FA).
2. Association and Dialogue Between Individuals and
App: The app will ask users to identify who they
are filling out the CID with, i.e., the other party
involved in the accident. This association can be
84–90
created between the phones of the involved parties
using GPS, NFC, or Bluetooth directly in the app, or
by sharing a link if the other party doesn’t have the
app.
3. Creation of Chat Between Parties: The app then
opens a chat where the participants, i.e., those
involved in the accident, can fill out the digital CID,
updating it with photos, videos, SSI credentials, etc.
4. Cross-Signing for CID Approval and Insurance
Reporting: If the CID is completed in mutual
agreement, users can digitally sign not only their version
of the CID but also the other’s. Once signed, these
CIDs are automatically sent to the certified mail of
the respective insurance companies, thus reporting
the incident.
5. Incident Reporting: At this point, the incident is
reported to all involved insurance companies. They
will hash the received CIDs and record these hashes
on the blockchain. Once the incident’s dynamics are
established, the insurance companies will:
6. Update the digital car passport for the involved
vehicles. The digital car passport is managed by the
insurance company the car is insured with.
7. Issue Verifiable Credentials (VC) for eligibility for
repairs for the vehicle found not at fault.</p>
      <sec id="sec-6-1">
        <title>5.1. Advantages and Disadvantages</title>
        <p>Advantages: Avoids errors and delays in standard
procedures, allowing quicker CID completion and avoiding trafic
congestion. Prevents identity falsification through SSI
credentials. Insurance companies are directly involved through
the digital CID. Drivers cannot avoid reporting incidents
as the black box records any impact. The app ensures
incident reports are made to insurance companies, reducing
fraud. Blockchain ensures accurate tracking of incidents and
damages, preventing fraud. Drivers do not face delays in
receiving repair funds and are directed to authorized repair
shops.</p>
        <p>Disadvantages: The efectiveness depends on at least
one party using the technology. Current SSI applications
communicate only from the service provider to the user,
limiting transaction initiation. Coordination among insurers
for a unified app format is challenging. Below is a summary
table of the advantages and disadvantages of the proposed
solutions:</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>6. The Project: Architecture</title>
      <p>The Digital Vehicle Passport (DVP) will be created and
managed through a private blockchain, with the vehicle’s
insurance company holding control. When a vehicle is first sold,
the initial insurance company creates the DVP and inserts it
into the blockchain, with visibility restricted to authorized
parties. If the vehicle changes ownership and insurance
providers, the control over the DVP is transferred to the
new insurance company. The blockchain, using Multichain,
stores information permanently, allowing only additions
and no deletions.</p>
      <sec id="sec-7-1">
        <title>6.1. System Logical Architecture</title>
        <p>The system uses a private blockchain with nodes
representing insurance companies and possibly a regulatory body.
In the case of an accident, the insurance company of the
involved driver records the incident on the blockchain and
notifies the other involved insurance company. The key
transactions are:</p>
        <p>TRANSACTION 0A: The driver reports the accident.
TRANSACTION 1A-B: Insurance company A notifies
insurance company B about the accident. TRANSACTION
2B: Insurance company B verifies the data and confirms or
denies the accident. TRANSACTION 4: Consultation of the
vehicle’s history.
The private blockchain, named PDAChain1, is created and
initialized on one node (Node1), with the node address
shared with a second node (Node2). Node1 grants Node2
permission to connect and interact with the blockchain.</p>
      </sec>
      <sec id="sec-7-2">
        <title>6.3. The Project Implementation:TRX 1A-B</title>
      </sec>
      <sec id="sec-7-3">
        <title>Accident Notification via Monetary</title>
      </sec>
      <sec id="sec-7-4">
        <title>Transaction</title>
        <p>Node1 sends 10 PDACoin to Node2 to notify about the
accident. Node2 confirms the accident by sending 1 PDACoin
or denies it with 0 PDACoin.</p>
      </sec>
      <sec id="sec-7-5">
        <title>6.4. The Project Implementation: TRX 2B-A:</title>
      </sec>
      <sec id="sec-7-6">
        <title>Accident Confirmation</title>
        <p>Insurance company B verifies the data externally and
conifrms the accident by sending 1 PDACoin to Node1.</p>
      </sec>
      <sec id="sec-7-7">
        <title>6.5. The Project Implementation:Stream</title>
      </sec>
      <sec id="sec-7-8">
        <title>Creation for TRX 3A Update PDA</title>
        <p>A stream is created to record the accident. Both nodes
publish JSON data with details of the accident for the respective
involved vehicles in the stream. Each stream key contains
information about the accident and reported damages.</p>
      </sec>
      <sec id="sec-7-9">
        <title>6.6. The Project Implementation: PDA</title>
      </sec>
      <sec id="sec-7-10">
        <title>Consultation</title>
        <p>Interested parties must request the vehicle’s history from
the insurance company, which can consult the streams
associated with the vehicle’s license plate to obtain accident
data. Consultation is done through MultiChain commands
that allow searching and viewing streams and associated
details.</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>7. Conclusion</title>
      <p>In conclusion, the document proposes a solution to the main
issues in pre- and post-accident scenarios, which are often
marked by uncertainty about procedures, driver
cooperation, and the accuracy and reliability of exchanged
information. The Digital Accident Report (DAR) system, leveraging
SSI credentials and the Digital Vehicle Passport (DVP),
enhances transparency, security, and eficiency. Key benefits
include:
1. Transparency of information flow.
2. SSI credentials prevent identity fraud.
3. DAR completion ensures immediate and fraud-proof
reporting to insurance companies.
4. The afected party can receive compensation even if
drivers do not cooperate.
5. Compensation and vehicle repairs are expedited and
fraud-proof.
6. Insurance payouts are restricted to repair purposes
using SSI credentials.</p>
      <p>7. The DVP eliminates vehicle history fraud.</p>
      <p>
        The success of this project relies on widespread adoption of
these technologies, including the DAR app and connected
black box, along with SSI credentials. One challenge is the
need for high technology adoption and the integration of
diverse data systems. Future steps involve insurance
companies convincing their clients of the benefits of the DVP
and SSI credential. In future works, the artificial intelligence
will be applied to optimize the procedure discussed in this
paper. In fact, the artificial intelligence has proven to be
efective in diferent contexts but which present problems
similar to those addressed in this paper [
        <xref ref-type="bibr" rid="ref25 ref26 ref27">25, 26, 27</xref>
        ].
84–90
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>L.</given-names>
            <surname>Cotugno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mazzenga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vizzarri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Giuliano</surname>
          </string-name>
          ,
          <article-title>The major opportunities of blockchain for automotive industry: a review, in: 2021 AEIT International Conference on Electrical and Electronic Technologies for Automotive (AEIT AUTOMOTIVE)</article-title>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>E.</given-names>
            <surname>Iacobelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ponzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <article-title>Eyetracking system with low-end hardware: Development and evaluation</article-title>
          ,
          <string-name>
            <surname>Information</surname>
          </string-name>
          (Switzerland)
          <volume>14</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .3390/info14120644.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Guettala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <article-title>Enhancing sentiment analysis on seed-iv dataset with vision transformers: A comparative study</article-title>
          , in: ACM International Conference Proceeding Series,
          <year>2023</year>
          , p.
          <fpage>238</fpage>
          -
          <lpage>246</lpage>
          . doi:
          <volume>10</volume>
          .1145/ 3638985.3639024.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>F.</given-names>
            <surname>Fiani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ponzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <article-title>Keeping eyes on the road: Understanding driver attention and its role in safe driving</article-title>
          ,
          <source>in: CEUR Workshop Proceedings</source>
          , volume
          <volume>3695</volume>
          ,
          <year>2023</year>
          , p.
          <fpage>85</fpage>
          -
          <lpage>95</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>G. C.</given-names>
            <surname>Cardarilli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. Di</given-names>
            <surname>Nunzio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Fazzolari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Giardino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Re</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ricci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Spano</surname>
          </string-name>
          ,
          <article-title>An fpga-based multi-agent reinforcement learning timing synchronizer</article-title>
          ,
          <source>Computers and Electrical Engineering</source>
          <volume>99</volume>
          (
          <year>2022</year>
          )
          <fpage>107749</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>F.</given-names>
            <surname>Fiani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <article-title>A fully automatic visual attention estimation support system for a safer driving experience</article-title>
          ,
          <source>in: CEUR Workshop Proceedings</source>
          , volume
          <volume>3695</volume>
          ,
          <year>2023</year>
          , p.
          <fpage>40</fpage>
          -
          <lpage>50</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>D.</given-names>
            <surname>Giardino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. C.</given-names>
            <surname>Cardarilli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. Di</given-names>
            <surname>Nunzio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Fazzolari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nannarelli</surname>
          </string-name>
          , M. Re,
          <string-name>
            <given-names>S.</given-names>
            <surname>Spanò</surname>
          </string-name>
          ,
          <article-title>M-psk demodulator with joint carrier and timing recovery</article-title>
          ,
          <source>IEEE Transactions on Circuits and Systems II: Express Briefs</source>
          <volume>68</volume>
          (
          <year>2020</year>
          )
          <fpage>1912</fpage>
          -
          <lpage>1916</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>F.</given-names>
            <surname>Fiani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <article-title>An advanced solution based on machine learning for remote emdr therapy</article-title>
          ,
          <source>Technologies</source>
          <volume>11</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .3390/ technologies11060172.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>G. C.</given-names>
            <surname>Cardarilli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. Di</given-names>
            <surname>Nunzio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Fazzolari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Panella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Re</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rosato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Span</surname>
          </string-name>
          ,
          <article-title>A parallel hardware implementation for 2-d hierarchical clustering based on fuzzy logic</article-title>
          ,
          <source>IEEE Transactions on Circuits and Systems II: Express Briefs</source>
          <volume>68</volume>
          (
          <year>2020</year>
          )
          <fpage>1428</fpage>
          -
          <lpage>1432</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>N.</given-names>
            <surname>Brandizzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Fanti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Gallotta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Iocchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Nardi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <article-title>Unsupervised pose estimation by means of an innovative vision transformer</article-title>
          ,
          <source>in: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</source>
          , volume
          <volume>13589</volume>
          LNAI,
          <year>2023</year>
          , p.
          <fpage>3</fpage>
          -
          <lpage>20</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -23480-
          <issue>4</issue>
          _
          <fpage>1</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Nakamoto</surname>
          </string-name>
          ,
          <article-title>Bitcoin: A peer-to-peer electronic cash system</article-title>
          ,
          <source>Satoshi Nakamoto</source>
          (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>P. K.</given-names>
            <surname>Kaushal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bagga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sobti</surname>
          </string-name>
          ,
          <article-title>Evolution of bitcoin and security risk in bitcoin wallets</article-title>
          , in: 2017 International Conference on Computer,
          <source>Communications and Electronics (Comptelix)</source>
          , IEEE,
          <year>2017</year>
          , pp.
          <fpage>172</fpage>
          -
          <lpage>177</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>B. A.</given-names>
            <surname>Nowak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Nowicki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Woźniak</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Napoli, Multi-class nearest neighbour classifier for incomplete data handling</article-title>
          ,
          <source>in: Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)</source>
          , volume
          <volume>9119</volume>
          ,
          <year>2015</year>
          , p.
          <fpage>469</fpage>
          -
          <lpage>480</lpage>
          . doi:
          <volume>10</volume>
          .1007/ 978-3-
          <fpage>319</fpage>
          -19324-3_
          <fpage>42</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Wikipedia</surname>
          </string-name>
          , Algoritmo rsa, ???? URL: https://en. wikipedia.org/wiki/RSA_(cryptosystem).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Xie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Dai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>An overview of blockchain technology: Architecture, consensus, and future trends, in: 2017 IEEE international congress on big data (BigData congress)</article-title>
          , Ieee,
          <year>2017</year>
          , pp.
          <fpage>557</fpage>
          -
          <lpage>564</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>R.</given-names>
            <surname>Giuliano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mazzenga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Innocenti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vizzarri</surname>
          </string-name>
          ,
          <article-title>Integration of video and radio technologies for social distancing</article-title>
          ,
          <source>IEEE Communications Magazine</source>
          <volume>59</volume>
          (
          <year>2021</year>
          )
          <fpage>30</fpage>
          -
          <lpage>35</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woźniak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , E. Tramontana,
          <article-title>Graphic object feature extraction system based on cuckoo search algorithm</article-title>
          ,
          <source>Expert Systems with Applications</source>
          <volume>66</volume>
          (
          <year>2016</year>
          )
          <fpage>20</fpage>
          -
          <lpage>31</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.eswa.
          <year>2016</year>
          .
          <volume>08</volume>
          .068.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M.</given-names>
            <surname>Wozniak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , E. Tramontana, G. Capizzi,
          <string-name>
            <given-names>G.</given-names>
            <surname>Lo</surname>
          </string-name>
          <string-name>
            <surname>Sciuto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Nowicki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. T.</given-names>
            <surname>Starczewski</surname>
          </string-name>
          ,
          <article-title>A multiscale image compressor with rbfnn and discrete wavelet decomposition</article-title>
          ,
          <source>in: Proceedings of the International Joint Conference on Neural Networks</source>
          , volume
          <volume>2015</volume>
          <source>-September</source>
          ,
          <year>2015</year>
          . doi:
          <volume>10</volume>
          .1109/IJCNN.
          <year>2015</year>
          .
          <volume>7280461</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>G.</given-names>
            <surname>Capizzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. L.</given-names>
            <surname>Sciuto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Monforte</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Napoli, Cascade feed forward neural network-based model for air pollutants evaluation of single monitoring stations in urban areas</article-title>
          ,
          <source>International Journal of Electronics and Telecommunications</source>
          <volume>61</volume>
          (
          <year>2015</year>
          )
          <fpage>327</fpage>
          -
          <lpage>332</lpage>
          . doi:
          <volume>10</volume>
          .1515/eletel-2015-0042.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Alfarano</surname>
          </string-name>
          , G. De Magistris,
          <string-name>
            <given-names>L.</given-names>
            <surname>Mongelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Starczewski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <article-title>A novel convmixer transformer based architecture for violent behavior detection</article-title>
          ,
          <source>in: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</source>
          , volume
          <volume>14126</volume>
          LNAI,
          <year>2023</year>
          , p.
          <fpage>3</fpage>
          -
          <lpage>16</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -42508-
          <issue>0</issue>
          _
          <fpage>1</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>N.</given-names>
            <surname>Brandizzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          , G. Galati,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <article-title>Addressing vehicle sharing through behavioral analysis: A solution to user clustering using recency-frequencymonetary and vehicle relocation based on neighborhood splits</article-title>
          ,
          <source>Information (Switzerland) 13</source>
          (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .3390/info13110511.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>N.</given-names>
            <surname>Genise</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>David</surname>
          </string-name>
          ,
          <article-title>Cryptography review of w3c verifiable credentials data model (vcdm) and decentralized identifiers (dids) standards and cryptography implementation recommendations (</article-title>
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pappalardo</surname>
          </string-name>
          , E. Tramontana,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Nowicki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. T.</given-names>
            <surname>Starczewski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Woźniak</surname>
          </string-name>
          ,
          <article-title>Toward work groups classification based on probabilistic neural network approach</article-title>
          ,
          <source>in: Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)</source>
          , volume
          <volume>9119</volume>
          ,
          <year>2015</year>
          , p.
          <fpage>79</fpage>
          -
          <lpage>89</lpage>
          . doi:
          <volume>10</volume>
          .1007/ 978-3-
          <fpage>319</fpage>
          -19324-
          <issue>3</issue>
          _
          <fpage>8</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>D.</given-names>
            <surname>Kilroy</surname>
          </string-name>
          ,
          <article-title>A decentralised website login system using 'decentralized identifiers' (</article-title>
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>G.</given-names>
            <surname>Lo Sciuto</surname>
          </string-name>
          , G. Capizzi,
          <string-name>
            <given-names>S.</given-names>
            <surname>Coco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Shikler</surname>
          </string-name>
          ,
          <article-title>Geometric shape optimization of organic solar cells for eficiency enhancement by neural networks</article-title>
          ,
          <source>in: Advances on Mechanics, Design Engineering and Manufacturing: Proceedings of the International Joint Conference on Mechanics, Design Engineering &amp; Advanced Manufacturing (JCM</source>
          <year>2016</year>
          ),
          <fpage>14</fpage>
          -
          <lpage>16</lpage>
          September,
          <year>2016</year>
          , Catania, Italy, Springer,
          <year>2017</year>
          , pp.
          <fpage>789</fpage>
          -
          <lpage>796</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>G.</given-names>
            <surname>Lo Sciuto</surname>
          </string-name>
          , G. Capizzi,
          <string-name>
            <given-names>R.</given-names>
            <surname>Shikler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <article-title>Organic solar cells defects classification by using a new feature extraction algorithm and an ebnn with an innovative pruning algorithm</article-title>
          ,
          <source>International Journal of Intelligent Systems</source>
          <volume>36</volume>
          (
          <year>2021</year>
          )
          <fpage>2443</fpage>
          -
          <lpage>2464</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>G. L.</given-names>
            <surname>Sciuto</surname>
          </string-name>
          , G. Susi, G. Cammarata,
          <string-name>
            <given-names>G.</given-names>
            <surname>Capizzi</surname>
          </string-name>
          ,
          <article-title>A spiking neural network-based model for anaerobic digestion process</article-title>
          , in: 2016
          <source>International Symposium on Power Electronics</source>
          , Electrical Drives,
          <article-title>Automation and Motion (SPEEDAM)</article-title>
          , IEEE,
          <year>2016</year>
          , pp.
          <fpage>996</fpage>
          -
          <lpage>1003</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>