Thomas Hardjono

According to our database1, Thomas Hardjono authored at least 77 papers between 1990 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Hermes: Fault-tolerant middleware for blockchain interoperability.
Future Gener. Comput. Syst., 2022

Exploring Web3 From the View of Blockchain.
CoRR, 2022

From Trade-only to Zero-Value NFTs: The Asset Proxy NFT Paradigm in Web3.
CoRR, 2022

Towards an attestation architecture for blockchain networks.
World Wide Web, 2021

Secure and secret cooperation in robot swarms.
Sci. Robotics, 2021

What's Next in Blockchain Research?: - An Identification of Key Topics Using a Multidisciplinary Perspective.
Data Base, 2021

Towards Blockchain-enabled Open Architectures for Scalable Digital Asset Platforms.
CoRR, 2021

Attestation Infrastructures for Private Wallets.
CoRR, 2021

Blockchain Gateways, Bridges and Delegated Hash-Locks.
CoRR, 2021

Future Directions for Regulated Private Wallets and VASP Trust Infrastructures.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Enabling Cross-Jurisdiction Digital Asset Transfer.
Proceedings of the IEEE International Conference on Services Computing, 2021

To What Extent Will Blockchain Drive the Machine Economy? Perspectives From a Prospective Study.
IEEE Trans. Engineering Management, 2020

Toward an Interoperability Architecture for Blockchain Autonomous Systems.
IEEE Trans. Engineering Management, 2020

Towards a Contract Service Provider Model for Virtual Assets and VASPs.
CoRR, 2020

Trust Infrastructures for Virtual Asset Service Providers.
CoRR, 2020

Confidential Computing for Privacy-Preserving Contact Tracing.
CoRR, 2020

Wallet Attestations for Virtual Asset Service Providers and Crypto-Assets Insurance.
CoRR, 2020

An Attestation Architecture for Blockchain Networks.
CoRR, 2020

Privacy-Preserving Claims Exchange Networks for Virtual Asset Service Providers.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

Development of Trust Infrastructures for Virtual Asset Service Providers.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

Proposal for a Comprehensive (Crypto) Asset Taxonomy.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2020

Decentralized Trusted Computing Base for Blockchain Infrastructure Security.
Frontiers Blockchain, 2019

Federated Authorization over Access to Personal Data for Decentralized Identity Management.
IEEE Commun. Stand. Mag., 2019

Privacy-Preserving Claims Exchange Networks for Virtual Asset Service Providers.
CoRR, 2019

Empowering Artists, Songwriters & Musicians in a Data Cooperative through Blockchains and Smart Contracts.
CoRR, 2019

Towards an Open and Scalable Music Metadata Layer.
CoRR, 2019

Towards a Public Key Management Framework for Virtual Assets and Virtual Asset Service Providers.
CoRR, 2019

A Federated Authorization Framework for Distributed Personal Data and Digital Identity.
CoRR, 2019

Data Cooperatives: Towards a Foundation for Decentralized Personal Data Management.
CoRR, 2019

Secure and secret cooperation of robotic swarms by using Merkle trees.
CoRR, 2019

Verifiable Anonymous Identities and Access Control in Permissioned Blockchains.
CoRR, 2019

Architecture Board Practices in Adaptive Enterprise Architecture with Digital Platform: A Case of Global Healthcare Enterprise.
Int. J. Enterp. Inf. Syst., 2018

Genie: A Secure, Transparent Sharing and Services Platform for Genetic and Health Data.
CoRR, 2018

Towards a Design Philosophy for Interoperable Blockchain Systems.
CoRR, 2018

RoboChain: A Secure Data-Sharing Framework for Human-Robot Interaction.
CoRR, 2018

An Adaptive Enterprise Architecture Framework and Implementation: Towards Global Enterprises in the era of Cloud/Mobile IT/Digital IT.
Int. J. Enterp. Inf. Syst., 2017

Open Algorithms for Identity Federation.
CoRR, 2017

Secure sharing of geospatial wildlife data.
Proceedings of the Fourth International ACM Workshop on Managing and Mining Enriched Geo-Spatial Data, 2017

The effect of a blockchain-supported, privacy-preserving system on disclosure of personal data.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Proposal of GDTC model for global communication on enterprise portal.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

Risk Management for Digital Transformation in Architecture Board: A Case Study on Global Enterprise.
Proceedings of the 6th IIAI International Congress on Advanced Applied Informatics, 2017

Cloud-Based Commissioning of Constrained Devices using Permissioned Blockchains.
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 2016

Social Use Cases for the ID3 Open Mustard Seed Platform.
IEEE Technol. Soc. Mag., 2014

On the Design of Trustworthy Compute Frameworks for Self-organizing Digital Institutions.
Proceedings of the Social Computing and Social Media, 2014

Towards a cloud-based integrity measurement service.
J. Cloud Comput., 2013

The Group Domain of Interpretation.
RFC, October, 2011

The Multicast Group Security Architecture.
RFC, March, 2004

The Group Domain of Interpretation.
RFC, July, 2003

Fundamentals of computer security.
Springer, ISBN: 978-3-540-43101-5, 2003

Group Security Policy Management for IP Multicast and Group Security.
Proceedings of the NETWORKING 2002, 2002

Group Key Management for IP Multicast: Model & Architecture.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

Group Security Association (GSA) Management in IP Multicast.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

MBA: A Tool for Multicast Billing and Accounting.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

IP multicast security: Issues and directions.
Ann. des Télécommunications, 2000

RP-Based Multicast Receiver Access Control in PIM-SM.
Proceedings of the NETWORKING 2000, 2000

Router-Assistance for Receiver Access Control in PIM-SM.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000

Collection servers: an architecture for multicast receiver reporting.
Proceedings of the 7th ACM International Conference on Multimedia '99, Orlando, FL, USA, October 30, 1999

Key Management Framework for IP Multicast Infrastructure Security.
Proceedings of the Intelligence in Services and Networks, 1999

A Secure Group Membership Verification Protocol for IP Multicast.
Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 1999

PIM -SM Security: Interdomain Issues and Solutions.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999

Secure and Scalable Inter-Domain Group Key Management for N-to-N Multicast.
Proceedings of the International Conference on Parallel and Distributed Systems, 1998

An Architecture for Conference-Support Using Secured Multicast.
Proceedings of the High Performance Networking, 1998

Beacons for Authentication in Distributed Systems.
J. Comput. Secur., 1996

Security model for distributed object framework and its applicability to CORBA.
Proceedings of the Information Systems Security, 1996

Replicating the Kuperee authentication server for increased security and reliability.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

Applications of smartcards for anonymous and verifiable databases.
Comput. Secur., 1995

Information Security in Mobile Databases.
Proceedings of the Sixth Australasian Database Conference, 1995

Database authentication revisited.
Comput. Secur., 1994

Secure end-to-end delegations in distributed systems.
Comput. Commun., 1994

Reusing Shares in Secret Sharing Schemes.
Comput. J., 1994

Kuperee: An Approach to Authentication using Public Keys.
Proceedings of the Upper Layer Protocols, 1994

Authentication via Multi-Service Tickets in the Kuperee Server.
Proceedings of the Computer Security, 1994

Fixed-Path Proxy-Logins with Assured Termination.
Proceedings of the Computing and Information, 1993

A Practical Digital Multisignature Scheme Based on Discrete Logarithms.
Proceedings of the Advances in Cryptology, 1992

Sibling Intractable Function Families and Their Applications (Extended Abstract).
Proceedings of the Advances in Cryptology, 1991

Search Key Substitution in the Encipherment of B-Trees.
Proceedings of the 16th International Conference on Very Large Data Bases, 1990

Record Encryption in Distributed Databases.
Proceedings of the Advances in Cryptology, 1990