| |||||||||||||||
BIMA 2020 : International Workshop on Blockchain: Institutions, Mobility, Anonymity | |||||||||||||||
Link: https://jdconline.net/intap/BIMA-workshop.html | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The BIMA workshop is organized by the members of the Blockchain Project of the Digital Transformation group at the Norwegian University of Science and Technology. The Digital Transformation group conducted a series of internal workshops in the past and opens now up to invite researchers, practitioners and policy makers with this workshop and 2 co-located hackathons: Self-sovereign identity &Off-chain Scaling with the Lightning Network.
The goal of the BIMA workshop is to encourage people working in decentralised systems to get together and discuss the potential disruption as well as the impact blockchain technologies can have on the fabric of our society, with specific focus on Institutions, Mobility and Anonymity. Fundamental concepts of Blockchain Technology, such as autonomous and anonymous decentralisation of trust, represent a disruption in a number of contemporary areas where centralised solutions are used. The workshop shoud be of interest to finance and fintech, cloud computing providers, social, non-governmental and governmental institutions, mobile applications, identity systems, and many others. The technology also have an impact on self-organised groups such as in open source software development, and self-sovereign identity systems. All of these can benefit, or be disrupted, by the innovation in the blockchain research. Institutions Self-sovereign institutions and ability to part-take in efficient decentralised organisations is one of the holy grails of Blockchain technology researchers and enthusiasts. This line of work has its roots in cyberpunk movement and libertarian worldviews, and has been an initial trigger to blockchain experiments and world deployments of open public blockchain systems. The early DAO experiments demonstrated inherent issues and problems with such decentralised organizations. Can these issues be solved? Mobility Blockchain technology disruption in the mobile, IoT, and vehicle network space is already visible, however, most of the mainstream research is focused on systems that rely on servers and fixed network connectivity. This might be counter-intuitive that technology focused on decentralisation itself relies on centralised service providers. What will happen when the network is down? Mobile blockchains and mobile blockchain applications can provide improved decentralisation and help in addressing the network connectivity problems by providing solutions based, for example, on mobile ad-hoc peer-to-peer mesh networks, such as those used for vehicle-to-vehicle communication. We encourage discussion and submissions on decentralised networking, decentralised infrastructures, ad-hoc and mesh networks, and related areas in the context of blockchain and blockchain applications. Anonymity Anonymity and pseudo-anonymity offered by the existing decentralised public blockchain systems is already disrupting the financial and legal spheres. It impacts the social organisation, export control, value transfer control, and value transfer in general. It also disrupts the identity management. While the pseudo-anonymity aspect of blockchain systems is already appreciated by its users, anonymous blockchain systems are on the rise. They enhance both the application and the network layer by adding privacy preserving techniques. Connections between transactions and identities are obscured. The origin of a published transaction is hidden. On the other hand, many anonymity schemes still leak data: By applying heuristics on analyzed on-chain and network data of blockchain systems one can remove the added privacy benefits. Are current solutions secure? Can existing anonymity techniques be strengthen? How can privacy-enhanced systems be monitored and kept internally consistent, without sacrificing privacy? Submission Guidelines This workshop allows two type of submissions: Extended abstracts of maximum 2 pages, including references. Those can be based on work in progress, like PhD projects. The work with the extended abstracts can be published elsewhere. Full submissions of maximum 8 pages, including references. This must be original and not simultaneously submitted to another journal or conference. Each full submission will be peer-reviewed by at least two experts in the field for originality, significance, clarity, impact, and soundness and is supposed to be published in conference proceedings All submissions must be handed in via easy chair at: https://easychair.org/my/conference?conf=intap2020# Further details to be provided after negotiations with the publisher. Special Issue journal publication The workshop participants are encouraged to consider a submission of an extended version of their contributions to a Special Issue “Blockchain-Based Technology for Mobile Application”, on open access journal Electronics (IF 1.764, ISSN 2079-9292). The submission deadline is 31 August 2020, and papers maybe submitted immediately or at any point until 31 August 2020, as papers will be published on an ongoing basis. Please check detailed information about this special issue at the following link: https://www.mdpi.com/journal/electronics/special_issues/BTMA Indexing Electronics is a peer-reviewed, open access journal on the science of electronics and its applications. The journal is indexed by the Science Citation Index Expanded (Web of Science), Inspec (IET), and Scopus. Its Impact Factor is 1.764 (2018). The CiteScore 2018 is 2.49. Please get in touch if you have any questions to the assistant editor: kin.zhao@mdpi.com List of Topics Decentralised Autonomous Organisations Decentralised Autonomous Institutions Institutions utilising blockchain technology Self-sovereign Institutions Decentralised networking layers Ad-hoc blockchains, ad-hoc networks Off-chain (off-network) transactions Network-less payment systems Vehicle-to-vehicle blockchain applications Decentralised IoT networks Anonymity, Pseudo-anonymity & Privacy Self-sovereign identity systems Blockchain forensics Committees Workshop Chair Colin Boyd (Prof., NTNU) Mariusz Nowostawski (Assoc.Prof., NTNU) Program Committee Mariusz Nowostawski Javed Ahmed - Assistant Professor of Computer Science, Sukkur IBA University, Pakistan Christopher Frantz - Assoc. Prof. Computer Science, NTNU, Norway Sheikh Idrees Pedro Gómez, Hoplite Software, Salamanca, Spain Jingye Li - Assoc. Prof. Computer Science, NTNU, Norway Abylay Satybaldy Hao Wang - Assoc. Prof. Computer Science, NTNU, Norway Bartlomiej Slawski, Senior Vice President, European Private Equity Fund, Warsaw, Poland Bian Yang - Assoc. Prof. Computer Science, NTNU, Norway Md Sadek Ferdous - Assistant Professor, Department of CSE, SUST, Sylhet, Bangladesh, Research Associate, Centre for Global Finance and Technology, Imperial College Business School, London, UK Mitsuaki Nakasumi - Prof. Economics , Komazawa University Juan Caballero - Communications/Research at Spherity Wilfried Pimenta - Business Development Director at IOTA Foundation Organizing committee Abylay Satybaldy Sheikh Idrees Rene Pickhardt Linda Derawi Invited Speakers Snorre Lothar von Gohren Edwin (Co-Founder & CTO, Diwala) Wilfried Pimenta (Business Development Director at IOTA Foundation) Publication BIMA-2020 proceedings will be published in Springer. There is an option to submit extended version of submissions, with the deadline of 31st of August, 2020, to special issue journal publication (see above). Venue The workshop will take place in Gjovik, which is 120km north of Oslo. It is collocated with INTAP 2020 - 3rd International Conference on Intelligent Technologies and Applications SSI Hackathon 2020 The Self-Sovereign Identity ecosystem consists of a transparent trust framework and associated common infrastructure, empowers people and organizations to drive societal change. This hackathon track strives to contribute open source technical enhancements and extensions for SSI framework. Participants will collaborate and deliver solutions by utilizing a set of open standards (including DIDs, VC, and the once under work DIDComm, Secure Data Storage). We also want to see the usage of open-source technologies (e.g. Hyperledger Aries, DAF Framework from uPort). A list and links to possible open source technologies exists here: Existing librariers & Tools Possible successful outcomes Showcase the concept “Bring your own identity” Examples of applications to showcase interoperability. Proof of Concept that integrates SSI protocols with other existing identity solutions (FIDO2, OpenID Connect). Peer to peer communication and data exchange solutions based on DIDs. Easy to use key recovery mechanisms for identity wallets. Showcase an example of cloud agent SSI solution Showcase an interoperable example of cloud agent SSI solution Secure storage example for data exchange Guidelines Demonstrate its solutions fit and make sense in the bigger picture. Ensure interoperability. Ensure their technology is agnostic, open-source and scalable. The identity solution should adhere to existing standards, like DID & VC from W3C, the work happening at DIF and GDPR rules. It has to empower the users! All stakeholders (individuals, institutions, government) privacy and legal roles should be taken into account. Key element Interoperability, user-centric, privacy-enhancing. Contact All questions about the hackathon should be emailed to: Abylay Satybaldy -- abylay.satybaldy at ntnu.no Lightning Network Scaling Hackathon 2020 The Lightning network is the designated scaling solution to Bitcoin and on mainnet since the beginning of 2018. This hackathon aims to bring together people who want to gain a better understanding of the lightning network protocol and gain experiences with it or who want to build small research oriented projects with existing implementations of the Protocol (c-Lightning, lnd, eclair, rust-lightning) Read the specification of the Protocol at: https://github.com/lightningnetwork/lightning-rfc Possible successful outcomes Lapps (Lightning Network Applications) Plugins Patches Backup solutions Anlytics solutions Statistical analysis (of the network or log files) Protocol Extensions Path finding strategyies Proof of Concepts Contact All questions about the Lightning hackathon should be emailed to: Rene Pickhardt -- rene.m.pickhardt at ntnu.no |
|