[1] D. Brown, «Review of Five popular Hyperledger DLTs- Fabric, Besu, Sawtooth, Iroha and Indy», Linux Foundation - Training, 15 de febrero de 2021. https://training.linuxfoundation.org/blog/review-of-five-popular-hyperledger-dlts-fabric-besu-sawtooth-iroha-and-indy/ (accedido 23 de enero de 2023).
[2] C. Brunner, U. Gallersdörfer, F. Knirsch, D. Engel, y F. Matthes, «DID and VC:Untangling Decentralized Identifiers and Verifiable Credentials for the Web of Trust», en 2020 the 3rd International Conference on Blockchain Technology and Applications, Xi’an China, dic. 2020, pp. 61-66. doi: 10.1145/3446983.3446992.
[3] M. Godyn, M. Kedziora, Y. Ren, Y. Liu, y H. H. Song, «Analysis of solutions for a blockchain compliance with GDPR», Sci Rep, vol. 12, n.o 1, Art. n.o 1, sep. 2022, doi: 10.1038/s41598-022-19341-y.
[4] G. Kondova y J. Erbguth, «Self-sovereign identity on public blockchains and the GDPR», en Proceedings of the 35th Annual ACM Symposium on Applied Computing, Brno Czech Republic, mar. 2020, pp. 342-345. doi: 10.1145/3341105.3374066.
[5] N. Kumar S. y M. Dakshayini, «Secure Sharing of Health Data Using Hyperledger Fabric Based on Blockchain Technology», en 2020 International Conference on Mainstreaming Block Chain Implementation (ICOMBI), feb. 2020, pp. 1-5. doi: 10.23919/ICOMBI48604.2020.9203442.
[6] J. Li, J. Yuan, y Y. Xiao, «A traditional medicine intellectual property protection scheme based on Hyperledger Fabric», en 2022 4th International Conference on Advances in Computer Technology, Information Science and Communications (CTISC), abr. 2022, pp. 1-5. doi: 10.1109/CTISC54888.2022.9849749.
[7] A. Mühle, A. Grüner, T. Gayvoronskaya, y C. Meinel, «A survey on essential components of a self-sovereign identity», Computer Science Review, vol. 30, pp. 80-86, nov. 2018, doi: 10.1016/j.cosrev.2018.10.002.
[8] Rapinformes, «Niveles de seguridad de la LOPD», Rapinformes, 8 de mayo de 2017. https://rapinformes.es/niveles-de-seguridad-lopd/ (accedido 23 de enero de 2023).
[9] S. Shetty, C. A. Kamhoua, y L. L. Njilla, Blockchain for Distributed Systems Security. John Wiley & Sons, 2019.
[10] N. B. Truong, K. Sun, G. M. Lee, y Y. Guo, «GDPR-Compliant Personal Data Management: A Blockchain-Based Solution», IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1746-1761, 2020, doi: 10.1109/TIFS.2019.2948287.
[11] R. Zhou y Z. Lin, «A Privacy Protection Scheme for Permissioned Blockchain Based on Trusted Execution Environment», en 2022 International Conference on Blockchain Technology and Information Security (ICBCTIS), jul. 2022, pp. 1-4. doi: 10.1109/ICBCTIS55569.2022.00012.