<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232021000400308</article-id>
<article-id pub-id-type="doi">10.22201/icat.24486736e.2021.19.4.1046</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Immutable Ubiquitous Digital Certificate Authentication Using Blockchain Protocol]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rahardja]]></surname>
<given-names><![CDATA[Untung]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Hidayanto]]></surname>
<given-names><![CDATA[Achmad Nizar]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Putra]]></surname>
<given-names><![CDATA[Panca Oktavia Hadi]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Hardini]]></surname>
<given-names><![CDATA[Marviola]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,University of Raharja  ]]></institution>
<addr-line><![CDATA[ Banten]]></addr-line>
<country>Indonesia</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,University of Indonesia  ]]></institution>
<addr-line><![CDATA[Jawa Barat ]]></addr-line>
<country>Indonesia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2021</year>
</pub-date>
<volume>19</volume>
<numero>4</numero>
<fpage>308</fpage>
<lpage>321</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232021000400308&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232021000400308&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232021000400308&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: A new paradigm regarding a significant technological development has been introduced, each individual gets full trust in controlling an asset and can see the level of authenticity of a particular asset. Through qualitative methods, it is possible to have structured results as the first step to the perfection of the digitalization era, in which the current revolutionary technology called blockchain has come into play. One of the main innovations found through this research is the role of blockchain in enhancing e-certificate data security, it is proven that administration can be well distributed and reduce operational costs for every field in the world. It is clear that blockchain, especially in the world of education certification, has a big impact, because it can create a global trust network, immutable, authenticated, ubiquitous, and can shape a better world for Indonesia as a superpower. With good execution using the SHA-256 hash, e-certificate blockchain technology can be of high value and have an impact on the quality of potential human resources in educational institutions.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Blockchain]]></kwd>
<kwd lng="en"><![CDATA[E-Certificate]]></kwd>
<kwd lng="en"><![CDATA[Educational Institution]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Adiyanto]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Febrianto]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Authentication Of Transaction Process In E-marketplace Based On Blockchain technology]]></article-title>
<source><![CDATA[Aptisi Transactions On Technopreneurship (ATT)]]></source>
<year>2020</year>
<volume>2</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>68-74</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aggarwal]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Chaudhary]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Aujla]]></surname>
<given-names><![CDATA[G. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Choo]]></surname>
<given-names><![CDATA[K.-K. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Zomaya]]></surname>
<given-names><![CDATA[A. Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Blockchain for smart communities: Applications, challenges and opportunities]]></article-title>
<source><![CDATA[Journal of Network and Computer Applications]]></source>
<year>2019</year>
<volume>144</volume>
<page-range>13-48</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aini]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Hariguna]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Putra]]></surname>
<given-names><![CDATA[P. O. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Rahardja]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Understanding how gamification influences behaviour in education]]></article-title>
<source><![CDATA[International Journal of Advanced Trends in Computer Science and Engineering]]></source>
<year>2019</year>
<volume>8</volume>
<numero>1.5</numero>
<issue>1.5</issue>
<page-range>269-74</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aini]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Rahardja]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Tangkaw]]></surname>
<given-names><![CDATA[M. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Santoso]]></surname>
<given-names><![CDATA[N. P. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Khoirunisa]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Embedding a Blockchain Technology Pattern Into the QR Code for an Authentication Certificate]]></article-title>
<source><![CDATA[Jurnal Online Informatika]]></source>
<year>2020</year>
<volume>5</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>239-44</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alammary]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Alhazmi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Almasri]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gillani]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Blockchain-based applications in education: A systematic review]]></article-title>
<source><![CDATA[Applied Sciences]]></source>
<year>2019</year>
<volume>9</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>2400</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ante]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Smart contracts on the blockchain - A bibliometric analysis and review]]></article-title>
<source><![CDATA[Telematics and Informatics]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beck]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Müller-Bloch]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Blockchain as radical innovation: a framework for engaging with distributed ledgers as incumbent organization]]></article-title>
<source><![CDATA[Proceedings of the 50th Hawaii International Conference on System Sciences]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bergstra]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Burgess]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Blockchain Technology and its Applications A Promise]]></article-title>
<source><![CDATA[Theory view-V0]]></source>
<year>2018</year>
<volume>11</volume>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brilliantova]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Thurner]]></surname>
<given-names><![CDATA[T. W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Blockchain and the future of energy]]></article-title>
<source><![CDATA[Technology in Society]]></source>
<year>2019</year>
<volume>57</volume>
<page-range>38-45</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dabbagh]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sookhak]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Safa]]></surname>
<given-names><![CDATA[N. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The evolution of blockchain: A bibliometric study]]></article-title>
<source><![CDATA[Ieee Access]]></source>
<year>2019</year>
<volume>7</volume>
<page-range>19212-21</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Durand]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gremaud]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Pasquier]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Resilient, crowd-sourced LPWAN infrastructure using blockchain]]></article-title>
<source><![CDATA[Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems]]></source>
<year>2018</year>
<page-range>25-9</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ensmenger]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The environmental history of computing]]></article-title>
<source><![CDATA[Technology and Culture]]></source>
<year>2018</year>
<volume>59</volume>
<numero>4^sS7-S33</numero>
<issue>4^sS7-S33</issue>
<supplement>S7-S33</supplement>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Franzoni]]></surname>
<given-names><![CDATA[A. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Cárdenas]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Almazan]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Using Blockchain to Store Teachers&#8217; Certification in Basic Education in Mexico]]></article-title>
<source><![CDATA[2019 IEEE 19th International Conference on Advanced Learning Technologies (ICALT)]]></source>
<year>2019</year>
<volume>2161</volume>
<page-range>217-8</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[George]]></surname>
<given-names><![CDATA[R.P.]]></given-names>
</name>
<name>
<surname><![CDATA[Peterson]]></surname>
<given-names><![CDATA[B.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Yaros]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Beam]]></surname>
<given-names><![CDATA[D.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Dibbell]]></surname>
<given-names><![CDATA[J.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Moore]]></surname>
<given-names><![CDATA[R.C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Blockchain for business]]></article-title>
<source><![CDATA[Journal of Investment Compliance]]></source>
<year>2019</year>
<volume>20</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>17-21</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guritno]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Rahardja]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Theory and Application of IT Research]]></article-title>
<source><![CDATA[Metodologi Penelitian Teknologi Informasi]]></source>
<year>2011</year>
<publisher-name><![CDATA[Penerbit Andi]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guustaaf]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Rahardja]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Aini]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Maharani]]></surname>
<given-names><![CDATA[H. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Santoso]]></surname>
<given-names><![CDATA[N. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Blockchain-based Education Project]]></article-title>
<source><![CDATA[Aptisi Transactions on Management (ATM)]]></source>
<year>2020</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>46-61</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hariguna]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Rahardja]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Aini]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Nurfaizah]]></surname>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Effect of social media activities to determinants public participate intention of e-government]]></article-title>
<source><![CDATA[Procedia Computer Science]]></source>
<year>2019</year>
<volume>161</volume>
<page-range>233-41</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hepp]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Wortner]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Schönhals]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gipp]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Securing physical assets on the blockchain: Linking a novel object identification concept with distributed ledgers]]></article-title>
<source><![CDATA[Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems]]></source>
<year>2018</year>
<page-range>60-5</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Heriyanto]]></surname>
<given-names><![CDATA[A. P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Mobile Phone Forensics: Theory: Mobile Phone Forensics dan Security Series]]></source>
<year>2016</year>
<publisher-name><![CDATA[Penerbit Andi]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ho]]></surname>
<given-names><![CDATA[S. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kao]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[W.-Y]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Following the breadcrumbs: Timestamp pattern identification for cloud forensics]]></article-title>
<source><![CDATA[Digital Investigation]]></source>
<year>2018</year>
<volume>24</volume>
<page-range>79-94</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[Y.-C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[T.-T.]]></given-names>
</name>
<name>
<surname><![CDATA[Chatzopoulos]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Hui]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Hierarchical interactions between ethereum smart contracts across testnets]]></article-title>
<source><![CDATA[Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems]]></source>
<year>2018</year>
<page-range>7-12</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hughes]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Dwivedi]]></surname>
<given-names><![CDATA[Y. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Misra]]></surname>
<given-names><![CDATA[S. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Rana]]></surname>
<given-names><![CDATA[N. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Raghavan]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Akella]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Blockchain research, practice and policy: Applications, benefits, limitations, emerging research themes and research agenda]]></article-title>
<source><![CDATA[International Journal of Information Management]]></source>
<year>2019</year>
<volume>49</volume>
<page-range>114-29</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Komputer]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Best Encryption Tools]]></source>
<year>2013</year>
<publisher-name><![CDATA[Elex Media Komputindo]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Laurence]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Blockchain for dummies]]></source>
<year>2019</year>
<publisher-name><![CDATA[John Wiley &amp; Sons]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[J. Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A decentralized token economy: How blockchain and cryptocurrency can revolutionize business]]></article-title>
<source><![CDATA[Business Horizons]]></source>
<year>2019</year>
<volume>62</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>773-84</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[X. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Blockchain based data integrity service framework for IoT data]]></article-title>
<source><![CDATA[2017 IEEE International Conference on Web Services (ICWS)]]></source>
<year>2017</year>
<page-range>468-75</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lizcano]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Lara]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
<name>
<surname><![CDATA[White]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Aljawarneh]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Blockchain-based approach to create a model of trust in open and ubiquitous higher education]]></article-title>
<source><![CDATA[Journal of Computing in Higher Education]]></source>
<year>2020</year>
<volume>32</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>109-34</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ma]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Sha]]></surname>
<given-names><![CDATA[E. H.-M.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhuge]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Jiang]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Gu]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Towards the design of efficient hash-based indexing scheme for growing databases on non-volatile memory]]></article-title>
<source><![CDATA[Future Generation Computer Systems]]></source>
<year>2020</year>
<volume>105</volume>
<page-range>1-12</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Margulis]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Boeck]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Laroche]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Connecting with consumers using ubiquitous technology: A new model to forecast consumer reaction]]></article-title>
<source><![CDATA[Journal of Business Research]]></source>
<year>2020</year>
<volume>121</volume>
<page-range>448-60</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mattila]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[The blockchain phenomenon-the disruptive potential of distributed consensus architectures]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maulani]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Rahardja]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Hardini]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[I&#8217;zzaty]]></surname>
<given-names><![CDATA[R. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Aini]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Santoso]]></surname>
<given-names><![CDATA[N. P. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Educating Farmers Using Participatory Rural Appraisal Construct]]></article-title>
<source><![CDATA[2020 Fifth International Conference on Informatics and Computing (ICIC)]]></source>
<year>2020</year>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mohammed]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Aisha]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Himki]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Dithi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ardianto]]></surname>
<given-names><![CDATA[A. Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Blockchain Is Top Skill For 2020]]></article-title>
<source><![CDATA[Aptisi Transactions on Technopreneurship (ATT)]]></source>
<year>2020</year>
<volume>2</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>180-5</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Muzayana]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Karima]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kom]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Implementasi Delegated Computation Pada Public Cloud Menggunakan Algoritma Fully Homomorphic Encryption]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nurhaeni]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Karts]]></surname>
<given-names><![CDATA[K. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Hardini]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Viewboard Effectiveness on Raharja Internet Cafe Website as Sales Information Submission Media]]></article-title>
<source><![CDATA[Aptisi Transactions On Technopreneurship (ATT)]]></source>
<year>2019</year>
<volume>1</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>20-6</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pal]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Alam]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Thakur]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Key management for blockchain technology]]></article-title>
<source><![CDATA[ICT Express]]></source>
<year>2019</year>
<volume>7</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>76-80</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peters]]></surname>
<given-names><![CDATA[G. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Panayi]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money]]></article-title>
<source><![CDATA[New Economic Windows]]></source>
<year>2016</year>
<page-range>239-78</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rahardja]]></surname>
<given-names><![CDATA[I. U.]]></given-names>
</name>
<name>
<surname><![CDATA[Raharja]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Artificial informatics]]></article-title>
<source><![CDATA[2009 4th IEEE Conference on Industrial Electronics and Applications, ICIEA]]></source>
<year>2009</year>
<page-range>3064-7</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rahardja]]></surname>
<given-names><![CDATA[U]]></given-names>
</name>
<name>
<surname><![CDATA[Aini]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Graha]]></surname>
<given-names><![CDATA[Y. I.]]></given-names>
</name>
<name>
<surname><![CDATA[Khoirunisa]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Implementation of Gamification into Management of Education for Motivating Learners]]></article-title>
<source><![CDATA[Proceeding Interuniversity Forum for Strengthening Academic Competency]]></source>
<year>2019</year>
<volume>1</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>209</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rahardja]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Bist]]></surname>
<given-names><![CDATA[A. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Hardini]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Aini]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Harahap]]></surname>
<given-names><![CDATA[E. P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Authentication of Covid-19 Patient Certification with Blockchain Protocol]]></article-title>
<source><![CDATA[International Journal of Advanced Science and Technology]]></source>
<year>2020</year>
<volume>29</volume>
<numero>^s8s</numero>
<issue>^s8s</issue>
<supplement>8s</supplement>
<page-range>4015-24</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rahardja]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Hardini]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Al Nasir]]></surname>
<given-names><![CDATA[A. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Aini]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Taekwondo sports test and training data management using blockchain]]></article-title>
<source><![CDATA[2020 Fifth International Conference on Informatics and Computing (ICIC)]]></source>
<year>2020</year>
<page-range>1-6</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Selimi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kabbinale]]></surname>
<given-names><![CDATA[A. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Ali]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Navarro]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Sathiaseelan]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Towards blockchain-enabled wireless mesh networks]]></article-title>
<source><![CDATA[Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems]]></source>
<year>2018</year>
<page-range>13-8</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sellami]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Sellami]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Tiako]]></surname>
<given-names><![CDATA[P. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Efficient Management of Security for Supporting Intrusion Detection in Ubiquitous and Pervasive Environments]]></article-title>
<source><![CDATA[Procedia Computer Science]]></source>
<year>2019</year>
<volume>155</volume>
<page-range>402-9</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sicilia]]></surname>
<given-names><![CDATA[M.-A.]]></given-names>
</name>
<name>
<surname><![CDATA[García-Barriocanal]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez-Alonso]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Cuadrado]]></surname>
<given-names><![CDATA[J.-J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Decentralized Persistent Identifiers: a basic model for immutable handlers]]></article-title>
<source><![CDATA[Procedia Computer Science]]></source>
<year>2019</year>
<volume>146</volume>
<page-range>123-30</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Singhal]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Dhameja]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Panda]]></surname>
<given-names><![CDATA[P. S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Beginning Blockchain: A Beginner&#8217;s Guide to Building Blockchain Solutions]]></source>
<year>2018</year>
<publisher-name><![CDATA[Apress]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Skinner]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[ValueWeb: How fintech firms are using bitcoin blockchain and mobile technologies to create the Internet of value]]></source>
<year>2016</year>
<publisher-name><![CDATA[Marshall Cavendish International Asia Pte Ltd]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sudaryono, Rahardja]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Harahap]]></surname>
<given-names><![CDATA[E. P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Implementation of Information Planning and Strategies Industrial Technology 4.0 to Improve Business Intelligence Performance on Official Site APTISI]]></article-title>
<source><![CDATA[Journal of Physics: Conference Series]]></source>
<year>2019</year>
<volume>1179</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>0-7</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sunarya]]></surname>
<given-names><![CDATA[P. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Rahardja]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Sunarya]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Hardini]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Role Of Blockchain As A Security Support For Student Profiles In Technology Education Systems]]></article-title>
<source><![CDATA[InfoTekJar: Jurnal Nasional Informatika dan Teknologi Jaringan]]></source>
<year>2020</year>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>203-7</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Swan]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Blockchain enlightenment and smart city cryptopolis]]></article-title>
<source><![CDATA[Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems]]></source>
<year>2018</year>
<page-range>48-53</page-range></nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Teece]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Business models, business strategy and innovation]]></article-title>
<source><![CDATA[Long Range Planning]]></source>
<year>2010</year>
<volume>43</volume>
<numero>2-3</numero>
<issue>2-3</issue>
<page-range>172-94</page-range></nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tenorio-Fornés]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hassan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Pavón]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Open peer-to-peer systems over blockchain and ipfs: An agent oriented framework]]></article-title>
<source><![CDATA[Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems]]></source>
<year>2018</year>
<page-range>19-24</page-range></nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wei]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Tyagi]]></surname>
<given-names><![CDATA[S. K. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Blockchain data-based cloud data integrity protection mechanism]]></article-title>
<source><![CDATA[Future Generation Computer Systems]]></source>
<year>2020</year>
<volume>102</volume>
<page-range>902-11</page-range></nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Whyte]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cryptoterrorism: Assessing the utility of blockchain technologies for terrorist enterprise]]></article-title>
<source><![CDATA[Studies in Conflict &amp; Terrorism]]></source>
<year>2019</year>
<page-range>1-24</page-range></nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yusup]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Naufal]]></surname>
<given-names><![CDATA[R. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Hardini]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Management of Utilizing Data Analysis and Hypothesis Testing in Improving the Quality of Research Reports]]></article-title>
<source><![CDATA[Aptisi Transactions on Management (ATM)]]></source>
<year>2018</year>
<volume>2</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>159-67</page-range></nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zainuddin]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Junaidi]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Putra]]></surname>
<given-names><![CDATA[R. D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Design of E-Commerce Payment System at Tokopedia Online Shopping Site]]></article-title>
<source><![CDATA[Aptisi Transactions On Management]]></source>
<year>2017</year>
<volume>1</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>143-55</page-range></nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zeng]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Fu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Feng]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[BBCPS: A Blockchain Based Open Source Contribution Protection System]]></article-title>
<source><![CDATA[International Conference on Blockchain and Trustworthy Systems]]></source>
<year>2019</year>
<page-range>662-75</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
