default search action
Thomas Hardjono
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Rafael Belchior, Jan Süßenguth, Qi Feng, Thomas Hardjono, André Vasconcelos, Miguel Correia:
A Brief History of Blockchain Interoperability. Commun. ACM 67(10): 62-69 (2024) - [c37]Rafael Belchior, Sabrina Scuri, Nuno Nunes, Thomas Hardjono, André Vasconcelos:
Towards a Standard Framework for Blockchain Interoperability: A Position Paper. ICBC 2024: 1-5 - [c36]André Augusto, Rafael Belchior, André Vasconcelos, Miguel Correia, Thomas Hardjono:
Multi-Party Cross-Chain Asset Transfers. ICBC 2024: 259-263 - [c35]André Augusto, Rafael Belchior, Miguel Correia, André Vasconcelos, Luyao Zhang, Thomas Hardjono:
SoK: Security and Privacy of Blockchain Interoperability. SP 2024: 3840-3865 - [i28]Minfeng Qi, Qin Wang, Zhipeng Wang, Manvir Schneider, Tianqing Zhu, Shiping Chen, William Knottenbelt, Thomas Hardjono:
SoK: Bitcoin Layer Two (L2). CoRR abs/2409.02650 (2024) - 2023
- [j19]Rafael Belchior, Luke Riley, Thomas Hardjono, André Vasconcelos, Miguel Correia:
Do You Need a Distributed Ledger Technology Interoperability Solution? Distributed Ledger Technol. Res. Pract. 2(1): 1:1-1:37 (2023) - [c34]Kjell-Erik Marstein, Alexandru Chiriac, Luke Riley, Thomas Hardjono, Gilbert Verdian:
Implementing Secure Bridges: Learnings from the Secure Asset Transfer Protocol. ICBC 2023: 1-9 - [i27]Thomas Hardjono, Alex Pentland:
Data Cooperatives for Identity Attestations. CoRR abs/2312.14158 (2023) - 2022
- [j18]Rafael Belchior, André Vasconcelos, Miguel Correia, Thomas Hardjono:
Hermes: Fault-tolerant middleware for blockchain interoperability. Future Gener. Comput. Syst. 129: 236-251 (2022) - [i26]Denis Avrilionis, Thomas Hardjono:
From Trade-only to Zero-Value NFTs: The Asset Proxy NFT Paradigm in Web3. CoRR abs/2205.04899 (2022) - [i25]Qin Wang, Rujia Li, Qi Wang, Shiping Chen, Mark Ryan, Thomas Hardjono:
Exploring Web3 From the View of Blockchain. CoRR abs/2206.08821 (2022) - 2021
- [j17]Horst Treiblmaier, Melanie Swan, Primavera De Filippi, Mary C. Lacity, Thomas Hardjono, Henry Kim:
What's Next in Blockchain Research?: - An Identification of Key Topics Using a Multidisciplinary Perspective. Data Base 52(1): 27-52 (2021) - [j16]Eduardo Castelló Ferrer, Thomas Hardjono, Alex Pentland, Marco Dorigo:
Secure and secret cooperation in robot swarms. Sci. Robotics 6(56): 1538 (2021) - [j15]Thomas Hardjono, Ned M. Smith:
Towards an attestation architecture for blockchain networks. World Wide Web 24(5): 1587-1615 (2021) - [c33]Rafael Belchior, André Vasconcelos, Miguel Correia, Thomas Hardjono:
Enabling Cross-Jurisdiction Digital Asset Transfer. SCC 2021: 431-436 - [c32]Thomas Hardjono:
Future Directions for Regulated Private Wallets and VASP Trust Infrastructures. IEEE ICBC 2021: 1-3 - [i24]Thomas Hardjono:
Blockchain Gateways, Bridges and Delegated Hash-Locks. CoRR abs/2102.03933 (2021) - [i23]Thomas Hardjono:
Attestation Infrastructures for Private Wallets. CoRR abs/2102.12473 (2021) - [i22]Denis Avrilionis, Thomas Hardjono:
Towards Blockchain-enabled Open Architectures for Scalable Digital Asset Platforms. CoRR abs/2110.12553 (2021) - 2020
- [j14]André Schweizer, Patricia Knoll, Nils Urbach, Heiko A. von der Gracht, Thomas Hardjono:
To What Extent Will Blockchain Drive the Machine Economy? Perspectives From a Prospective Study. IEEE Trans. Engineering Management 67(4): 1169-1183 (2020) - [j13]Thomas Hardjono, Alexander Lipton, Alex Pentland:
Toward an Interoperability Architecture for Blockchain Autonomous Systems. IEEE Trans. Engineering Management 67(4): 1298-1309 (2020) - [c31]Thomas Ankenbrand, Denis Bieri, Roland Cortivo, Johannes Hoehener, Thomas Hardjono:
Proposal for a Comprehensive (Crypto) Asset Taxonomy. CVCBT 2020: 16-26 - [c30]Thomas Hardjono:
Development of Trust Infrastructures for Virtual Asset Service Providers. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 74-91 - [c29]Thomas Hardjono, Alexander Lipton, Alex Pentland:
Privacy-Preserving Claims Exchange Networks for Virtual Asset Service Providers. IEEE ICBC 2020: 1-8 - [i21]Thomas Hardjono, Ned M. Smith:
An Attestation Architecture for Blockchain Networks. CoRR abs/2005.04293 (2020) - [i20]Thomas Hardjono, Alexander Lipton, Alex Pentland:
Wallet Attestations for Virtual Asset Service Providers and Crypto-Assets Insurance. CoRR abs/2005.14689 (2020) - [i19]David Sturzenegger, Aetienne Sardon, Stefan Deml, Thomas Hardjono:
Confidential Computing for Privacy-Preserving Contact Tracing. CoRR abs/2006.14235 (2020) - [i18]Thomas Hardjono:
Trust Infrastructures for Virtual Asset Service Providers. CoRR abs/2008.05048 (2020) - [i17]Thomas Hardjono, Alexander Lipton, Alex Pentland:
Towards a Contract Service Provider Model for Virtual Assets and VASPs. CoRR abs/2009.07413 (2020)
2010 – 2019
- 2019
- [j12]Thomas Hardjono:
Federated Authorization over Access to Personal Data for Decentralized Identity Management. IEEE Commun. Stand. Mag. 3(4): 32-38 (2019) - [j11]Thomas Hardjono, Ned M. Smith:
Decentralized Trusted Computing Base for Blockchain Infrastructure Security. Frontiers Blockchain 2: 24 (2019) - [i16]Thomas Hardjono, Alex Pentland:
Verifiable Anonymous Identities and Access Control in Permissioned Blockchains. CoRR abs/1903.04584 (2019) - [i15]Eduardo Castelló Ferrer, Thomas Hardjono, Alex Pentland:
Secure and secret cooperation of robotic swarms by using Merkle trees. CoRR abs/1904.09266 (2019) - [i14]Thomas Hardjono, Ned M. Smith:
Decentralized Trusted Computing Base for Blockchain Infrastructure Security. CoRR abs/1905.04412 (2019) - [i13]Thomas Hardjono, Alex Pentland:
Data Cooperatives: Towards a Foundation for Decentralized Personal Data Management. CoRR abs/1905.08819 (2019) - [i12]Thomas Hardjono:
A Federated Authorization Framework for Distributed Personal Data and Digital Identity. CoRR abs/1906.03552 (2019) - [i11]Thomas Hardjono, Alexander Lipton, Alex Pentland:
Towards a Public Key Management Framework for Virtual Assets and Virtual Asset Service Providers. CoRR abs/1909.08607 (2019) - [i10]Thomas Hardjono, George Howard, Eric Scace, Mizan Chowdury, Lucas Novak, Meghan Gaudet, Justin Anderson, Nicole d'avis, Christopher Kulis, Edward Sweeney, Chandler Vaughan:
Towards an Open and Scalable Music Metadata Layer. CoRR abs/1911.08278 (2019) - [i9]Thomas Hardjono, Alex Pentland:
Empowering Artists, Songwriters & Musicians in a Data Cooperative through Blockchains and Smart Contracts. CoRR abs/1911.10433 (2019) - [i8]Thomas Hardjono, Alex Pentland:
Privacy-Preserving Claims Exchange Networks for Virtual Asset Service Providers. CoRR abs/1912.06871 (2019) - 2018
- [j10]Yoshimasa Masuda, Seiko Shirasaka, Shuichiro Yamamoto, Thomas Hardjono:
Architecture Board Practices in Adaptive Enterprise Architecture with Digital Platform: A Case of Global Healthcare Enterprise. Int. J. Enterp. Inf. Syst. 14(1): 1-20 (2018) - [i7]Eduardo Castelló Ferrer, Ognjen Rudovic, Thomas Hardjono, Alex Pentland:
RoboChain: A Secure Data-Sharing Framework for Human-Robot Interaction. CoRR abs/1802.04480 (2018) - [i6]Thomas Hardjono, Alexander Lipton, Alex Pentland:
Towards a Design Philosophy for Interoperable Blockchain Systems. CoRR abs/1805.05934 (2018) - [i5]Shifa Zhang, Anne Kim, Dianbo Liu, Sandeep C. Nuckchadyy, Lauren Huang, Aditya Masurkar, Jingwei Zhang, Lawrence Tseng, Pratheek Karnati, Laura Martínez, Thomas Hardjono, Manolis Kellis, ZhiZhuo Zhang:
Genie: A Secure, Transparent Sharing and Services Platform for Genetic and Health Data. CoRR abs/1811.01431 (2018) - 2017
- [j9]Yoshimasa Masuda, Seiko Shirasaka, Shuichiro Yamamoto, Thomas Hardjono:
An Adaptive Enterprise Architecture Framework and Implementation: Towards Global Enterprises in the era of Cloud/Mobile IT/Digital IT. Int. J. Enterp. Inf. Syst. 13(3): 1-22 (2017) - [c28]Yoshimasa Masuda, Seiko Shirasaka, Shuichiro Yamamoto, Thomas Hardjono:
Risk Management for Digital Transformation in Architecture Board: A Case Study on Global Enterprise. IIAI-AAI 2017: 255-262 - [c27]Yoshimasa Masuda, Seiko Shirasaka, Shuichiro Yamamoto, Thomas Hardjono:
Proposal of GDTC model for global communication on enterprise portal. KES 2017: 1178-1188 - [c26]Remo Manuel Frey, Pascal Buhler, Alexander Gerdes, Thomas Hardjono, Klaus Ludwig Fuchs, Alexander Ilic:
The effect of a blockchain-supported, privacy-preserving system on disclosure of personal data. NCA 2017: 409-413 - [c25]Remo Manuel Frey, Thomas Hardjono, Christian Smith, Keeley Erhardt, Alex 'Sandy' Pentland:
Secure sharing of geospatial wildlife data. GeoRich@SIGMOD 2017: 5:1-5:6 - [i4]Thomas Hardjono, Sandy Pentland:
Open Algorithms for Identity Federation. CoRR abs/1705.10880 (2017) - 2016
- [c24]Thomas Hardjono, Ned M. Smith:
Cloud-Based Commissioning of Constrained Devices using Permissioned Blockchains. IoTPTS@AsiaCCS 2016: 29-36 - 2014
- [j8]Thomas Hardjono, Patrick Deegan, John Henry Clippinger:
Social Use Cases for the ID3 Open Mustard Seed Platform. IEEE Technol. Soc. Mag. 33(3): 48-54 (2014) - [c23]Thomas Hardjono, Patrick Deegan, John Henry Clippinger:
On the Design of Trustworthy Compute Frameworks for Self-organizing Digital Institutions. HCI (22) 2014: 342-353 - 2013
- [j7]John Zic, Thomas Hardjono:
Towards a cloud-based integrity measurement service. J. Cloud Comput. 2: 4 (2013) - 2011
- [i3]Brian Weis, Sheela Rowles, Thomas Hardjono:
The Group Domain of Interpretation. RFC 6407: 1-64 (2011)
2000 – 2009
- 2004
- [i2]Thomas Hardjono, Brian Weis:
The Multicast Group Security Architecture. RFC 3740: 1-26 (2004) - 2003
- [b1]Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry:
Fundamentals of computer security. Springer 2003, ISBN 978-3-540-43101-5, pp. I-XX, 1-677 - [i1]Mark Baugher, Brian Weis, Thomas Hardjono, Hugh Harney:
The Group Domain of Interpretation. RFC 3547: 1-48 (2003) - 2002
- [c22]Thomas Hardjono, Hugh Harney:
Group Security Policy Management for IP Multicast and Group Security. NETWORKING 2002: 1123-1128 - 2001
- [c21]Lakshminath R. Dondeti, Brian Haberman, Haldon J. Sandick, Thomas Hardjono, Haixiang He:
MBA: A Tool for Multicast Billing and Accounting. ISCC 2001: 172-177 - [c20]Thomas Hardjono, Mark Baugher, Hugh Harney:
Group Security Association (GSA) Management in IP Multicast. SEC 2001: 213-228 - [c19]Thomas Hardjono, Mark Baugher, Hugh Harney:
Group Key Management for IP Multicast: Model & Architecture. WETICE 2001: 223-228 - 2000
- [j6]Thomas Hardjono, Gene Tsudik:
IP multicast security: Issues and directions. Ann. des Télécommunications 55(7-8): 324-340 (2000) - [c18]Thomas Hardjono:
Router-Assistance for Receiver Access Control in PIM-SM. ISCC 2000: 687-692 - [c17]Thomas Hardjono:
RP-Based Multicast Receiver Access Control in PIM-SM. NETWORKING 2000: 120-131
1990 – 1999
- 1999
- [c16]Thomas Hardjono, Brad Cain:
PIM -SM Security: Interdomain Issues and Solutions. Communications and Multimedia Security 1999: 191-208 - [c15]Thomas Hardjono, Brad Cain:
A Secure Group Membership Verification Protocol for IP Multicast. ISCC 1999: 9-15 - [c14]Thomas Hardjono:
Key Management Framework for IP Multicast Infrastructure Security. IS&N 1999: 385-398 - [c13]Brad Cain, Thomas Hardjono:
Collection servers: an architecture for multicast receiver reporting. ACM Multimedia (2) 1999: 107-109 - 1998
- [c12]Thomas Hardjono, Naganand Doraswamy, Brad Cain:
An Architecture for Conference-Support Using Secured Multicast. HPN 1998: 79-93 - [c11]Thomas Hardjono, Brad Cain:
Secure and Scalable Inter-Domain Group Key Management for N-to-N Multicast. ICPADS 1998: 478- - 1996
- [j5]Azad Jiwa, Thomas Hardjono, Jennifer Seberry:
Beacons for Authentication in Distributed Systems. J. Comput. Secur. 4(1): 81-96 (1996) - [c10]Thomas Hardjono, Jennifer Seberry:
Replicating the Kuperee authentication server for increased security and reliability. ACISP 1996: 14-26 - [c9]Vijay Varadharajan, Thomas Hardjono:
Security model for distributed object framework and its applicability to CORBA. SEC 1996: 452-463 - 1995
- [j4]Thomas Hardjono, Jennifer Seberry:
Applications of smartcards for anonymous and verifiable databases. Comput. Secur. 14(5): 465-472 (1995) - [c8]Thomas Hardjono, Jennifer Seberry:
Information Security in Mobile Databases. Australasian Database Conference 1995 - 1994
- [j3]Yuliang Zheng, Thomas Hardjono, Jennifer Seberry:
Reusing Shares in Secret Sharing Schemes. Comput. J. 37(3): 199-205 (1994) - [j2]Thomas Hardjono, Tadashi Ohta:
Secure end-to-end delegations in distributed systems. Comput. Commun. 17(3): 230-238 (1994) - [j1]Thomas Hardjono, Yuliang Zheng, Jennifer Seberry:
Database authentication revisited. Comput. Secur. 13(7): 573-580 (1994) - [c7]Thomas Hardjono, Jennifer Seberry:
Authentication via Multi-Service Tickets in the Kuperee Server. ESORICS 1994: 143-160 - [c6]Thomas Hardjono, Yuliang Zheng, Jennifer Seberry:
Kuperee: An Approach to Authentication using Public Keys. ULPAA 1994: 65-76 - 1993
- [c5]Thomas Hardjono, Tadashi Ohta:
Fixed-Path Proxy-Logins with Assured Termination. ICCI 1993: 111-115 - 1992
- [c4]Thomas Hardjono, Yuliang Zheng:
A Practical Digital Multisignature Scheme Based on Discrete Logarithms. AUSCRYPT 1992: 122-132 - 1991
- [c3]Yuliang Zheng, Thomas Hardjono, Josef Pieprzyk:
Sibling Intractable Function Families and Their Applications (Extended Abstract). ASIACRYPT 1991: 124-138 - 1990
- [c2]Thomas Hardjono:
Record Encryption in Distributed Databases. AUSCRYPT 1990: 386-395 - [c1]Thomas Hardjono, Jennifer Seberry:
Search Key Substitution in the Encipherment of B-Trees. VLDB 1990: 50-58
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint