posted by user: abyl || 1657 views || tracked by 2 users: [display]

BIMA 2020 : International Workshop on Blockchain: Institutions, Mobility, Anonymity


When Sep 28, 2020 - Sep 30, 2020
Where Gjovik, Norway
Submission Deadline Jul 5, 2020
Notification Due Jul 12, 2020
Final Version Due Aug 31, 2020
Categories    blockchain   identity   privacy

Call For Papers

The BIMA workshop is organized by the members of the Blockchain Project of the Digital Transformation group at the Norwegian University of Science and Technology. The Digital Transformation group conducted a series of internal workshops in the past and opens now up to invite researchers, practitioners and policy makers with this workshop and 2 co-located hackathons: Self-sovereign identity &Off-chain Scaling with the Lightning Network.

The goal of the BIMA workshop is to encourage people working in decentralised systems to get together and discuss the potential disruption as well as the impact blockchain technologies can have on the fabric of our society, with specific focus on Institutions, Mobility and Anonymity.
Fundamental concepts of Blockchain Technology, such as autonomous and anonymous decentralisation of trust, represent a disruption in a number of contemporary areas where centralised solutions are used. The workshop shoud be of interest to finance and fintech, cloud computing providers, social, non-governmental and governmental institutions, mobile applications, identity systems, and many others. The technology also have an impact on self-organised groups such as in open source software development, and self-sovereign identity systems. All of these can benefit, or be disrupted, by the innovation in the blockchain research.

Self-sovereign institutions and ability to part-take in efficient decentralised organisations is one of the holy grails of Blockchain technology researchers and enthusiasts. This line of work has its roots in cyberpunk movement and libertarian worldviews, and has been an initial trigger to blockchain experiments and world deployments of open public blockchain systems. The early DAO experiments demonstrated inherent issues and problems with such decentralised organizations. Can these issues be solved?

Blockchain technology disruption in the mobile, IoT, and vehicle network space is already visible, however, most of the mainstream research is focused on systems that rely on servers and fixed network connectivity. This might be counter-intuitive that technology focused on decentralisation itself relies on centralised service providers. What will happen when the network is down? Mobile blockchains and mobile blockchain applications can provide improved decentralisation and help in addressing the network connectivity problems by providing solutions based, for example, on mobile ad-hoc peer-to-peer mesh networks, such as those used for vehicle-to-vehicle communication.
We encourage discussion and submissions on decentralised networking, decentralised infrastructures, ad-hoc and mesh networks, and related areas in the context of blockchain and blockchain applications.

Anonymity and pseudo-anonymity offered by the existing decentralised public blockchain systems is already disrupting the financial and legal spheres. It impacts the social organisation, export control, value transfer control, and value transfer in general. It also disrupts the identity management.
While the pseudo-anonymity aspect of blockchain systems is already appreciated by its users, anonymous blockchain systems are on the rise. They enhance both the application and the network layer by adding privacy preserving techniques. Connections between transactions and identities are obscured. The origin of a published transaction is hidden. On the other hand, many anonymity schemes still leak data: By applying heuristics on analyzed on-chain and network data of blockchain systems one can remove the added privacy benefits.
Are current solutions secure? Can existing anonymity techniques be strengthen? How can privacy-enhanced systems be monitored and kept internally consistent, without sacrificing privacy?

Submission Guidelines
This workshop allows two type of submissions:
Extended abstracts of maximum 2 pages, including references. Those can be based on work in progress, like PhD projects. The work with the extended abstracts can be published elsewhere.
Full submissions of maximum 8 pages, including references. This must be original and not simultaneously submitted to another journal or conference.
Each full submission will be peer-reviewed by at least two experts in the field for originality, significance, clarity, impact, and soundness and is supposed to be published in conference proceedings
All submissions must be handed in via easy chair at:
Further details to be provided after negotiations with the publisher.
Special Issue journal publication
The workshop participants are encouraged to consider a submission of an extended version of their contributions to a Special Issue “Blockchain-Based Technology for Mobile Application”, on open access journal Electronics (IF 1.764, ISSN 2079-9292). The submission deadline is 31 August 2020, and papers maybe submitted immediately or at any point until 31 August 2020, as papers will be published on an ongoing basis.
Please check detailed information about this special issue at the following link:
Electronics is a peer-reviewed, open access journal on the science of electronics and its applications. The journal is indexed by the Science Citation Index Expanded (Web of Science), Inspec (IET), and Scopus. Its Impact Factor is 1.764 (2018). The CiteScore 2018 is 2.49.
Please get in touch if you have any questions to the assistant editor:

List of Topics
Decentralised Autonomous Organisations
Decentralised Autonomous Institutions
Institutions utilising blockchain technology
Self-sovereign Institutions
Decentralised networking layers
Ad-hoc blockchains, ad-hoc networks
Off-chain (off-network) transactions
Network-less payment systems
Vehicle-to-vehicle blockchain applications
Decentralised IoT networks
Anonymity, Pseudo-anonymity & Privacy
Self-sovereign identity systems
Blockchain forensics
Workshop Chair
Colin Boyd (Prof., NTNU)
Mariusz Nowostawski (Assoc.Prof., NTNU)
Program Committee
Mariusz Nowostawski
Javed Ahmed - Assistant Professor of Computer Science, Sukkur IBA University, Pakistan
Christopher Frantz - Assoc. Prof. Computer Science, NTNU, Norway
Sheikh Idrees
Pedro Gómez, Hoplite Software, Salamanca, Spain
Jingye Li - Assoc. Prof. Computer Science, NTNU, Norway
Abylay Satybaldy
Hao Wang - Assoc. Prof. Computer Science, NTNU, Norway
Bartlomiej Slawski, Senior Vice President, European Private Equity Fund, Warsaw, Poland
Bian Yang - Assoc. Prof. Computer Science, NTNU, Norway
Md Sadek Ferdous - Assistant Professor, Department of CSE, SUST, Sylhet, Bangladesh, Research Associate, Centre for Global Finance and Technology, Imperial College Business School, London, UK
Mitsuaki Nakasumi - Prof. Economics , Komazawa University
Juan Caballero - Communications/Research at Spherity
Wilfried Pimenta - Business Development Director at IOTA Foundation

Organizing committee
Abylay Satybaldy
Sheikh Idrees
Rene Pickhardt
Linda Derawi

Invited Speakers

Snorre Lothar von Gohren Edwin (Co-Founder & CTO, Diwala)
Wilfried Pimenta (Business Development Director at IOTA Foundation)

BIMA-2020 proceedings will be published in Springer.
There is an option to submit extended version of submissions, with the deadline of 31st of August, 2020, to special issue journal publication (see above).

The workshop will take place in Gjovik, which is 120km north of Oslo. It is collocated with INTAP 2020 - 3rd International Conference on Intelligent Technologies and Applications

SSI Hackathon 2020
The Self-Sovereign Identity ecosystem consists of a transparent trust framework and associated common infrastructure, empowers people and organizations to drive societal change.
This hackathon track strives to contribute open source technical enhancements and extensions for SSI framework. Participants will collaborate and deliver solutions by utilizing a set of open standards (including DIDs, VC, and the once under work DIDComm, Secure Data Storage). We also want to see the usage of open-source technologies (e.g. Hyperledger Aries, DAF Framework from uPort). A list and links to possible open source technologies exists here: Existing librariers & Tools
Possible successful outcomes
Showcase the concept “Bring your own identity”
Examples of applications to showcase interoperability.
Proof of Concept that integrates SSI protocols with other existing identity solutions (FIDO2, OpenID Connect).
Peer to peer communication and data exchange solutions based on DIDs.
Easy to use key recovery mechanisms for identity wallets.
Showcase an example of cloud agent SSI solution
Showcase an interoperable example of cloud agent SSI solution
Secure storage example for data exchange
Demonstrate its solutions fit and make sense in the bigger picture.
Ensure interoperability.
Ensure their technology is agnostic, open-source and scalable.
The identity solution should adhere to existing standards, like DID & VC from W3C, the work happening at DIF and GDPR rules. It has to empower the users!
All stakeholders (individuals, institutions, government) privacy and legal roles should be taken into account.
Key element
Interoperability, user-centric, privacy-enhancing.
All questions about the hackathon should be emailed to:
Abylay Satybaldy -- abylay.satybaldy at

Lightning Network Scaling Hackathon 2020
The Lightning network is the designated scaling solution to Bitcoin and on mainnet since the beginning of 2018. This hackathon aims to bring together people who want to gain a better understanding of the lightning network protocol and gain experiences with it or who want to build small research oriented projects with existing implementations of the Protocol (c-Lightning, lnd, eclair, rust-lightning)
Read the specification of the Protocol at:
Possible successful outcomes
Lapps (Lightning Network Applications)
Backup solutions
Anlytics solutions
Statistical analysis (of the network or log files)
Protocol Extensions
Path finding strategyies
Proof of Concepts
All questions about the Lightning hackathon should be emailed to:
Rene Pickhardt -- rene.m.pickhardt at

Related Resources

UbiSec 2024   The 4th International Conference on Ubiquitous Security
CST 2024   11th International Conference on Advances in Computer Science and Information Technology
CSTFM 2024   2024 International Conference on Smart Transportation and Future Mobility (CSTFM 2024)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
Ei/Scopus-MLBDM 2024   2024 4th International Conference on Machine Learning and Big Data Management (MLBDM 2024)
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
IEEESM 2024   2024 IEEE International Conference on Smart Mobility
AIDD 2024   2nd International Conference on AI, Data Mining and Data Science
Global Studies 2024   Seventeenth Global Studies Conference
COINE 2024   International Workshop on Coordination, Organizations, Institutions, Norms and Ethics for Governance of Multi-Agent Systems