posted by user: abyl || 479 views || tracked by 1 users: [display]

BIMA 2020 : International Workshop on Blockchain: Institutions, Mobility, Anonymity

FacebookTwitterLinkedInGoogle

Link: https://jdconline.net/intap/BIMA-workshop.html
 
When Sep 28, 2020 - Sep 30, 2020
Where Gjovik, Norway
Submission Deadline Jul 5, 2020
Notification Due Jul 12, 2020
Final Version Due Aug 31, 2020
Categories    blockchain   identity   privacy
 

Call For Papers

The BIMA workshop is organized by the members of the Blockchain Project of the Digital Transformation group at the Norwegian University of Science and Technology. The Digital Transformation group conducted a series of internal workshops in the past and opens now up to invite researchers, practitioners and policy makers with this workshop and 2 co-located hackathons: Self-sovereign identity &Off-chain Scaling with the Lightning Network.

The goal of the BIMA workshop is to encourage people working in decentralised systems to get together and discuss the potential disruption as well as the impact blockchain technologies can have on the fabric of our society, with specific focus on Institutions, Mobility and Anonymity.
Fundamental concepts of Blockchain Technology, such as autonomous and anonymous decentralisation of trust, represent a disruption in a number of contemporary areas where centralised solutions are used. The workshop shoud be of interest to finance and fintech, cloud computing providers, social, non-governmental and governmental institutions, mobile applications, identity systems, and many others. The technology also have an impact on self-organised groups such as in open source software development, and self-sovereign identity systems. All of these can benefit, or be disrupted, by the innovation in the blockchain research.

Institutions
Self-sovereign institutions and ability to part-take in efficient decentralised organisations is one of the holy grails of Blockchain technology researchers and enthusiasts. This line of work has its roots in cyberpunk movement and libertarian worldviews, and has been an initial trigger to blockchain experiments and world deployments of open public blockchain systems. The early DAO experiments demonstrated inherent issues and problems with such decentralised organizations. Can these issues be solved?

Mobility
Blockchain technology disruption in the mobile, IoT, and vehicle network space is already visible, however, most of the mainstream research is focused on systems that rely on servers and fixed network connectivity. This might be counter-intuitive that technology focused on decentralisation itself relies on centralised service providers. What will happen when the network is down? Mobile blockchains and mobile blockchain applications can provide improved decentralisation and help in addressing the network connectivity problems by providing solutions based, for example, on mobile ad-hoc peer-to-peer mesh networks, such as those used for vehicle-to-vehicle communication.
We encourage discussion and submissions on decentralised networking, decentralised infrastructures, ad-hoc and mesh networks, and related areas in the context of blockchain and blockchain applications.

Anonymity
Anonymity and pseudo-anonymity offered by the existing decentralised public blockchain systems is already disrupting the financial and legal spheres. It impacts the social organisation, export control, value transfer control, and value transfer in general. It also disrupts the identity management.
While the pseudo-anonymity aspect of blockchain systems is already appreciated by its users, anonymous blockchain systems are on the rise. They enhance both the application and the network layer by adding privacy preserving techniques. Connections between transactions and identities are obscured. The origin of a published transaction is hidden. On the other hand, many anonymity schemes still leak data: By applying heuristics on analyzed on-chain and network data of blockchain systems one can remove the added privacy benefits.
Are current solutions secure? Can existing anonymity techniques be strengthen? How can privacy-enhanced systems be monitored and kept internally consistent, without sacrificing privacy?

Submission Guidelines
This workshop allows two type of submissions:
Extended abstracts of maximum 2 pages, including references. Those can be based on work in progress, like PhD projects. The work with the extended abstracts can be published elsewhere.
Full submissions of maximum 8 pages, including references. This must be original and not simultaneously submitted to another journal or conference.
Each full submission will be peer-reviewed by at least two experts in the field for originality, significance, clarity, impact, and soundness and is supposed to be published in conference proceedings
All submissions must be handed in via easy chair at: https://easychair.org/my/conference?conf=intap2020#
Further details to be provided after negotiations with the publisher.
Special Issue journal publication
The workshop participants are encouraged to consider a submission of an extended version of their contributions to a Special Issue “Blockchain-Based Technology for Mobile Application”, on open access journal Electronics (IF 1.764, ISSN 2079-9292). The submission deadline is 31 August 2020, and papers maybe submitted immediately or at any point until 31 August 2020, as papers will be published on an ongoing basis.
Please check detailed information about this special issue at the following link: https://www.mdpi.com/journal/electronics/special_issues/BTMA
Indexing
Electronics is a peer-reviewed, open access journal on the science of electronics and its applications. The journal is indexed by the Science Citation Index Expanded (Web of Science), Inspec (IET), and Scopus. Its Impact Factor is 1.764 (2018). The CiteScore 2018 is 2.49.
Please get in touch if you have any questions to the assistant editor: kin.zhao@mdpi.com

List of Topics
Decentralised Autonomous Organisations
Decentralised Autonomous Institutions
Institutions utilising blockchain technology
Self-sovereign Institutions
Decentralised networking layers
Ad-hoc blockchains, ad-hoc networks
Off-chain (off-network) transactions
Network-less payment systems
Vehicle-to-vehicle blockchain applications
Decentralised IoT networks
Anonymity, Pseudo-anonymity & Privacy
Self-sovereign identity systems
Blockchain forensics
Committees
Workshop Chair
Colin Boyd (Prof., NTNU)
Mariusz Nowostawski (Assoc.Prof., NTNU)
Program Committee
Mariusz Nowostawski
Javed Ahmed - Assistant Professor of Computer Science, Sukkur IBA University, Pakistan
Christopher Frantz - Assoc. Prof. Computer Science, NTNU, Norway
Sheikh Idrees
Pedro Gómez, Hoplite Software, Salamanca, Spain
Jingye Li - Assoc. Prof. Computer Science, NTNU, Norway
Abylay Satybaldy
Hao Wang - Assoc. Prof. Computer Science, NTNU, Norway
Bartlomiej Slawski, Senior Vice President, European Private Equity Fund, Warsaw, Poland
Bian Yang - Assoc. Prof. Computer Science, NTNU, Norway
Md Sadek Ferdous - Assistant Professor, Department of CSE, SUST, Sylhet, Bangladesh, Research Associate, Centre for Global Finance and Technology, Imperial College Business School, London, UK
Mitsuaki Nakasumi - Prof. Economics , Komazawa University
Juan Caballero - Communications/Research at Spherity
Wilfried Pimenta - Business Development Director at IOTA Foundation

Organizing committee
Abylay Satybaldy
Sheikh Idrees
Rene Pickhardt
Linda Derawi

Invited Speakers

Snorre Lothar von Gohren Edwin (Co-Founder & CTO, Diwala)
Wilfried Pimenta (Business Development Director at IOTA Foundation)


Publication
BIMA-2020 proceedings will be published in Springer.
There is an option to submit extended version of submissions, with the deadline of 31st of August, 2020, to special issue journal publication (see above).

Venue
The workshop will take place in Gjovik, which is 120km north of Oslo. It is collocated with INTAP 2020 - 3rd International Conference on Intelligent Technologies and Applications


SSI Hackathon 2020
The Self-Sovereign Identity ecosystem consists of a transparent trust framework and associated common infrastructure, empowers people and organizations to drive societal change.
This hackathon track strives to contribute open source technical enhancements and extensions for SSI framework. Participants will collaborate and deliver solutions by utilizing a set of open standards (including DIDs, VC, and the once under work DIDComm, Secure Data Storage). We also want to see the usage of open-source technologies (e.g. Hyperledger Aries, DAF Framework from uPort). A list and links to possible open source technologies exists here: Existing librariers & Tools
Possible successful outcomes
Showcase the concept “Bring your own identity”
Examples of applications to showcase interoperability.
Proof of Concept that integrates SSI protocols with other existing identity solutions (FIDO2, OpenID Connect).
Peer to peer communication and data exchange solutions based on DIDs.
Easy to use key recovery mechanisms for identity wallets.
Showcase an example of cloud agent SSI solution
Showcase an interoperable example of cloud agent SSI solution
Secure storage example for data exchange
Guidelines
Demonstrate its solutions fit and make sense in the bigger picture.
Ensure interoperability.
Ensure their technology is agnostic, open-source and scalable.
The identity solution should adhere to existing standards, like DID & VC from W3C, the work happening at DIF and GDPR rules. It has to empower the users!
All stakeholders (individuals, institutions, government) privacy and legal roles should be taken into account.
Key element
Interoperability, user-centric, privacy-enhancing.
Contact
All questions about the hackathon should be emailed to:
Abylay Satybaldy -- abylay.satybaldy at ntnu.no

Lightning Network Scaling Hackathon 2020
The Lightning network is the designated scaling solution to Bitcoin and on mainnet since the beginning of 2018. This hackathon aims to bring together people who want to gain a better understanding of the lightning network protocol and gain experiences with it or who want to build small research oriented projects with existing implementations of the Protocol (c-Lightning, lnd, eclair, rust-lightning)
Read the specification of the Protocol at: https://github.com/lightningnetwork/lightning-rfc
Possible successful outcomes
Lapps (Lightning Network Applications)
Plugins
Patches
Backup solutions
Anlytics solutions
Statistical analysis (of the network or log files)
Protocol Extensions
Path finding strategyies
Proof of Concepts
Contact
All questions about the Lightning hackathon should be emailed to:
Rene Pickhardt -- rene.m.pickhardt at ntnu.no

Related Resources

ICBC 2020   IEEE International Conference on Blockchain and Cryptocurrency 2020
SpaCCS 2020   The 13th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage
CCNET 2020   7th International Conference on Computer Networks & Communications
5GCM 2020   2020 International Workshop on 5G, Connectivity and Mobility (5GCM 2020)
TrustCom 2020   The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
SCIS 2020   4th IEEE Conference on Smart Cities and Innovative Systems
ICBDB 2020   2020 2nd International Conference on Big Data and Blockchain(ICBDB 2020) 
PFSM 2020   (Virtual) EAI International Conference on Privacy and Forensics in Smart Mobility
MOBILITY 2020   The Tenth International Conference on Mobile Services, Resources, and Users
CANS 2020   Cryptology and Network Security