<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<?covid-19-tdm?>
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JPH</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Public Health Surveill</journal-id>
      <journal-title>JMIR Public Health and Surveillance</journal-title>
      <issn pub-type="epub">2369-2960</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v7i4e26460</article-id>
      <article-id pub-id-type="pmid">33727212</article-id>
      <article-id pub-id-type="doi">10.2196/26460</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Viewpoint</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Viewpoint</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Test, Trace, and Put on the Blockchain?: A Viewpoint Evaluating the Use of Decentralized Systems for Algorithmic Contact Tracing to Combat a Global Pandemic</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Sanchez</surname>
            <given-names>Travis</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Wilder-Smith</surname>
            <given-names>Annelies</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Coelho</surname>
            <given-names>Flávio</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Miranda</surname>
            <given-names>Pedro</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Yan</surname>
            <given-names>Zhuang</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author">
          <name name-style="western">
            <surname>Platt</surname>
            <given-names>Moritz</given-names>
          </name>
          <degrees>BSc, MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-2137-4370</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Hasselgren</surname>
            <given-names>Anton</given-names>
          </name>
          <degrees>BSc, MSc</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-6245-6041</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Román-Belmonte</surname>
            <given-names>Juan Manuel</given-names>
          </name>
          <degrees>MD, PhD</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-2693-1439</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Tuler de Oliveira</surname>
            <given-names>Marcela</given-names>
          </name>
          <degrees>BSc, MSc</degrees>
          <xref rid="aff4" ref-type="aff">4</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-5739-5590</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>De la Corte-Rodríguez</surname>
            <given-names>Hortensia</given-names>
          </name>
          <degrees>MD, PhD</degrees>
          <xref rid="aff5" ref-type="aff">5</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-9179-201X</ext-link>
        </contrib>
        <contrib id="contrib6" contrib-type="author">
          <name name-style="western">
            <surname>Delgado Olabarriaga</surname>
            <given-names>Sílvia</given-names>
          </name>
          <degrees>MSc, PhD</degrees>
          <xref rid="aff4" ref-type="aff">4</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-5935-4482</ext-link>
        </contrib>
        <contrib id="contrib7" contrib-type="author">
          <name name-style="western">
            <surname>Rodríguez-Merchán</surname>
            <given-names>E Carlos</given-names>
          </name>
          <degrees>MD, PhD</degrees>
          <xref rid="aff6" ref-type="aff">6</xref>
          <xref rid="aff7" ref-type="aff">7</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-6360-0113</ext-link>
        </contrib>
        <contrib id="contrib8" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Mackey</surname>
            <given-names>Tim Ken</given-names>
          </name>
          <degrees>MAS, PhD</degrees>
          <xref rid="aff8" ref-type="aff">8</xref>
          <address>
            <institution>Department of Anesthesiology, Division of Infectious Diseases and Global Public Health</institution>
            <institution>School of Medicine</institution>
            <institution>UC San Diego</institution>
            <addr-line>8950 Villa La Jolla Drive</addr-line>
            <addr-line>A124</addr-line>
            <addr-line>La Jolla, CA, 92037</addr-line>
            <country>United States</country>
            <phone>1 951 491 4161</phone>
            <email>tmackey@ucsd.edu</email>
          </address>
          <xref rid="aff9" ref-type="aff">9</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-2191-7833</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Department of Informatics</institution>
        <institution>King's College London</institution>
        <addr-line>London</addr-line>
        <country>United Kingdom</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Department of Neuromedicine and Movement Science</institution>
        <institution>Faculty of Medicine and Health Sciences</institution>
        <institution>Norwegian University of Science and Technology</institution>
        <addr-line>Trondheim</addr-line>
        <country>Norway</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Department of Physical Medicine and Rehabilitation</institution>
        <institution>Hospital Central de la Cruz Roja San José y Santa Adela</institution>
        <addr-line>Madrid</addr-line>
        <country>Spain</country>
      </aff>
      <aff id="aff4">
        <label>4</label>
        <institution>Department of Epidemiology and Data Science</institution>
        <institution>Amsterdam UMC</institution>
        <addr-line>Amsterdam</addr-line>
        <country>Netherlands</country>
      </aff>
      <aff id="aff5">
        <label>5</label>
        <institution>Department of Physical Medicine and Rehabilitation</institution>
        <institution>La Paz University Hospital</institution>
        <addr-line>Madrid</addr-line>
        <country>Spain</country>
      </aff>
      <aff id="aff6">
        <label>6</label>
        <institution>Department of Orthopaedic Surgery</institution>
        <institution>La Paz University Hospital</institution>
        <addr-line>Madrid</addr-line>
        <country>Spain</country>
      </aff>
      <aff id="aff7">
        <label>7</label>
        <institution>Osteoarticular Surgery Research</institution>
        <institution>Hospital La Paz Institute for Health Research, IdiPAZ</institution>
        <addr-line>Madrid</addr-line>
        <country>Spain</country>
      </aff>
      <aff id="aff8">
        <label>8</label>
        <institution>Department of Anesthesiology, Division of Infectious Diseases and Global Public Health</institution>
        <institution>School of Medicine</institution>
        <institution>UC San Diego</institution>
        <addr-line>La Jolla, CA</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff9">
        <label>9</label>
        <institution>BlockLAB</institution>
        <institution>San Diego Supercomputer Center</institution>
        <institution>UC San Diego</institution>
        <addr-line>La Jolla, CA</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Tim Ken Mackey <email>tmackey@ucsd.edu</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>4</month>
        <year>2021</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>6</day>
        <month>4</month>
        <year>2021</year>
      </pub-date>
      <volume>7</volume>
      <issue>4</issue>
      <elocation-id>e26460</elocation-id>
      <history>
        <date date-type="received">
          <day>12</day>
          <month>12</month>
          <year>2020</year>
        </date>
        <date date-type="rev-request">
          <day>18</day>
          <month>1</month>
          <year>2021</year>
        </date>
        <date date-type="rev-recd">
          <day>20</day>
          <month>2</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>8</day>
          <month>3</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Moritz Platt, Anton Hasselgren, Juan Manuel Román-Belmonte, Marcela Tuler de Oliveira, Hortensia De la Corte-Rodríguez, Sílvia Delgado Olabarriaga, E Carlos Rodríguez-Merchán, Tim Ken Mackey. Originally published in JMIR Public Health and Surveillance (http://publichealth.jmir.org), 06.04.2021.</copyright-statement>
      <copyright-year>2021</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Public Health and Surveillance, is properly cited. The complete bibliographic information, a link to the original publication on http://publichealth.jmir.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://publichealth.jmir.org/2021/4/e26460" xlink:type="simple"/>
      <abstract>
        <p>The enormous pressure of the increasing case numbers experienced during the COVID-19 pandemic has given rise to a variety of novel digital systems designed to provide solutions to unprecedented challenges in public health. The field of algorithmic contact tracing, in particular, an area of research that had previously received limited attention, has moved into the spotlight as a crucial factor in containing the pandemic. The use of digital tools to enable more robust and expedited contact tracing and notification, while maintaining privacy and trust in the data generated, is viewed as key to identifying chains of transmission and close contacts, and, consequently, to enabling effective case investigations. Scaling these tools has never been more critical, as global case numbers have exceeded 100 million, as many asymptomatic patients remain undetected, and as COVID-19 variants begin to emerge around the world. In this context, there is increasing attention on blockchain technology as a part of systems for enhanced digital algorithmic contact tracing and reporting. By analyzing the literature that has emerged from this trend, the common characteristics of the designs proposed become apparent. An archetypal system architecture can be derived, taking these characteristics into consideration. However, assessing the utility of this architecture using a recognized evaluation framework shows that the added benefits and features of blockchain technology do not provide significant advantages over conventional centralized systems for algorithmic contact tracing and reporting. From our study, it, therefore, seems that blockchain technology may provide a more significant benefit in other areas of public health beyond contact tracing.</p>
      </abstract>
      <kwd-group>
        <kwd>COVID-19</kwd>
        <kwd>public health</kwd>
        <kwd>blockchain</kwd>
        <kwd>distributed ledger technology</kwd>
        <kwd>mobile apps</kwd>
        <kwd>pandemic mitigation</kwd>
        <kwd>contact tracing</kwd>
        <kwd>epidemiological monitoring</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>To many global health professionals, the emergence of the COVID-19 pandemic has not come as a complete surprise. The outbreak of SARS that occurred in the autumn of 2002 in Guangdong Province, China—characterized as the first near-pandemic in the era of globalization [<xref ref-type="bibr" rid="ref1">1</xref>]—marked the beginning of a new century in which global health security events would become more frequent and escalate rapidly across the globe. Following SARS came the global pandemic of H1N1, outbreaks of Middle East Respiratory Syndrome, the Zika virus, and new Ebola outbreaks. These served as early warning signs of what would become the most significant human health emergency since the 1918 influenza pandemic: the current COVID-19 global pandemic that has, as of February 2021, resulted in at least 100 million cases and 2 million deaths worldwide [<xref ref-type="bibr" rid="ref2">2</xref>].</p>
        <p>Throughout this period of accelerated outbreaks of novel, emerging, and re-emerging infectious diseases, calls for sound public health policy and further expansion of public health surveillance capacity to prevent future pandemics have become more frequent and urgent [<xref ref-type="bibr" rid="ref3">3</xref>]. However, investment in public health infrastructure, such as strengthening state capabilities under the World Health Organization International Health Regulations, did not heed these warnings: experts have painted a bleak picture of outbreak preparedness by characterizing the global pandemic response as cycles of panic succeeded by neglect [<xref ref-type="bibr" rid="ref4">4</xref>]. Consequently, various systems for disease surveillance, including electronic public health reporting modalities, were challenged by the complex requirements associated with COVID-19-related data. Some of these challenges stemmed from the inability of the relevant public health agencies to receive and share electronic data at a pandemic scale [<xref ref-type="bibr" rid="ref5">5</xref>], some from the use of inappropriate or outdated tools lacking interoperability [<xref ref-type="bibr" rid="ref6">6</xref>], and some from failing to meet security and privacy requirements [<xref ref-type="bibr" rid="ref7">7</xref>].</p>
        <p>As COVID-19 cases continue to surge, national governments have attempted to invest in and deploy more robust digital disease surveillance systems. These encompass different forms of technology (eg, digital epidemiology, big data, machine learning, mobile apps, and distributed computing), which are now viewed as critical tools to explore in order to modernize the pandemic response [<xref ref-type="bibr" rid="ref8">8</xref>]. While a rapid increase in innovation and investment in this area of technology has occurred, many of these technology-centric initiatives have encountered implementation barriers due to nontechnical challenges associated with data governance, user adoption, concerns about accountability and oversight, and patient privacy and social acceptance concerns [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref8">8</xref>]. An emerging technology that has been suggested in this context is blockchain, a form of distributed ledger technology that is maturing in several industries, including in areas of digital cryptocurrencies, financial transaction technology, and growing attention in industrial sectors, such as energy, transportation, supply chain, auditing, and health care [<xref ref-type="bibr" rid="ref9">9</xref>].</p>
      </sec>
      <sec>
        <title>Blockchain Uses in Health Care</title>
        <p>The adoption of blockchain, which can be characterized as an append-only distributed database that is coordinated via a peer-to-peer protocol [<xref ref-type="bibr" rid="ref10">10</xref>], removes the need for central operators and can offer potential improvements over traditional health care information management systems (eg, client-server systems) [<xref ref-type="bibr" rid="ref9">9</xref>]. Blockchain allows for tamper-proof replication of data in an adversarial environment [<xref ref-type="bibr" rid="ref11">11</xref>]. The technology is resilient to fault scenarios in which adversaries send conflicting information to different parts of the system [<xref ref-type="bibr" rid="ref12">12</xref>], even if those adversaries present large numbers of pseudonymous identities with malicious intent [<xref ref-type="bibr" rid="ref13">13</xref>]. Participants on a blockchain form consensus on whether a proposed record is admissible by adjudicating it using a consensus mechanism [<xref ref-type="bibr" rid="ref14">14</xref>], thus ensuring only valid records agreed upon by network members are replicated.</p>
        <p>Consensus on a blockchain network can be proof based (eg, proof-of-work consensus as used by the Bitcoin blockchain) or voting based (eg, proof-of-authority consensus) [<xref ref-type="bibr" rid="ref15">15</xref>], with different hybrid forms being an emerging field of research [<xref ref-type="bibr" rid="ref16">16</xref>]. Regarding access control, blockchain protocol taxonomies differentiate between public or private and permissionless or permissioned networks [<xref ref-type="bibr" rid="ref17">17</xref>]. Public blockchains are open to participation by anyone, whereas private, or <italic>enterprise</italic>, blockchains employ access control mechanisms. In a permissionless system, all members have the same responsibilities in the consensus protocol, while permissioned networks assign different responsibilities in consensus to participants, depending on their role and authority.</p>
        <p>Several use cases have emerged evidencing the potential utility of blockchain in health care data management. These include electronic health record (EHR) management and aggregation, privacy-preserving algorithms for health systems data, integration of blockchain systems with the Internet of Medical Things, enabling distributed patient-provider directories across multiple payers and providers, and enhancing management and security of health supply chains [<xref ref-type="bibr" rid="ref18">18</xref>-<xref ref-type="bibr" rid="ref21">21</xref>]. Accompanying this potential, blockchain also faces real-world implementation challenges, including storing and transferring data on- and off-chain, interoperability with other health information systems, managing permission structures, and ensuring scalability [<xref ref-type="bibr" rid="ref22">22</xref>].</p>
        <p>Blockchain has also been suggested as a potential solution in the context of COVID-19 algorithmic contact tracing by promising protection from cyberattacks [<xref ref-type="bibr" rid="ref23">23</xref>], allowing for global monitoring of social encounters to inform health policies [<xref ref-type="bibr" rid="ref24">24</xref>], enabling privacy [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>], preventing the falsification of diagnoses [<xref ref-type="bibr" rid="ref27">27</xref>], allowing users to retain ownership of personal data [<xref ref-type="bibr" rid="ref28">28</xref>], and ensuring the trustworthiness of that data [<xref ref-type="bibr" rid="ref29">29</xref>], while maintaining a record of its provenance [<xref ref-type="bibr" rid="ref26">26</xref>]. While none of the popular algorithmic contact tracing frameworks on the market today [<xref ref-type="bibr" rid="ref30">30</xref>] uses blockchain, the growing number of academic works [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref31">31</xref>-<xref ref-type="bibr" rid="ref38">38</xref>] suggests significant interest. Hence, this viewpoint aims to critically examine the potential utility and technical feasibility of blockchain technology for pandemic algorithmic contact tracing. This is accomplished by applying a blockchain evaluation framework that assesses the suitability of using the technology for specific use cases based on seven key questions. The viewpoint concludes with some recommendations of whether blockchain is a viable application for this critical public health use case and other observations about how to leverage this technology in the ongoing fight against COVID-19.</p>
      </sec>
    </sec>
    <sec>
      <title>Algorithmic Contact Tracing</title>
      <sec>
        <title>Overview of Conventional and Algorithmic Contact Tracing Approaches</title>
        <p>Contact tracing is an epidemiological control measure aimed at identifying all the people with whom an individual who contracted an infectious disease has been in contact, and who are, in turn, at risk of being infected with and transmitting that disease to other close contacts [<xref ref-type="bibr" rid="ref39">39</xref>]. It has pronounced benefits in controlling infections that remain undetected in the population [<xref ref-type="bibr" rid="ref40">40</xref>], such as the transmission of COVID-19, in which a large proportion of cases could be asymptomatic [<xref ref-type="bibr" rid="ref41">41</xref>]. Quick, reliable, and accurate tests to confirm cases are a prerequisite for successful contact tracing [<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref43">43</xref>], as, without them, infectious individuals can remain unidentified and continue to serve as human vectors sustaining community transmission. Insufficient testing can lead to underreporting of the true prevalence of the disease and its attack rate, as well as limit the effectiveness of nonpharmaceutical interventions, such as masking, social distancing, and other crucial public health interventions [<xref ref-type="bibr" rid="ref44">44</xref>]. Contact tracing, however, represents only one single stage in the process of effective outbreak control and response, which is only effective when combined with quarantine and isolation procedures [<xref ref-type="bibr" rid="ref45">45</xref>].</p>
        <p>Contact tracing has a rich history dating back to the late nineteenth century, when UK medical officers responded to infectious disease outbreaks such as smallpox with surveillance systems involving notification, isolation, disinfection, and case finding [<xref ref-type="bibr" rid="ref46">46</xref>]. The information age brought digital case management systems and other innovations (eg, digital epidemiology via mobile apps, internet surveillance, and disease modeling and forecasting using artificial intelligence) that are now being leveraged by health authorities. Yet, traditional interview-based approaches remain a mainstay [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref48">48</xref>]. Here, contact information is collected by health care professionals or volunteers who discover the contact history of individuals affected by an infectious disease through interviews with patients, families, or health care professionals or by analyzing medical records, tracking data, or surveillance data [<xref ref-type="bibr" rid="ref49">49</xref>].</p>
        <p>Where an interview-based contact tracing technique is used, its success relies on the ability of those affected to recollect their contact history. The reliability of such self-reported data is, however, questionable [<xref ref-type="bibr" rid="ref50">50</xref>]. Moreover, contact with unknown persons cannot be discovered through this approach. Furthermore, conventional contact tracing regimens are labor intensive, are associated with high costs per case, and yield diminishing disease prevalence reductions under incremental investments [<xref ref-type="bibr" rid="ref51">51</xref>]. Consequently, doubts have been raised about whether these traditional methods alone can be effective in the context of a large-scale pandemic. As a reaction, digital epidemiology methods, including algorithmic contact tracing, have been proposed to reduce virus transmission more effectively [<xref ref-type="bibr" rid="ref8">8</xref>]. Digital epidemiology, or “the use of data generated outside the public health system for disease surveillance” [<xref ref-type="bibr" rid="ref8">8</xref>], has been discussed since the 1990s [<xref ref-type="bibr" rid="ref52">52</xref>]. Most of the early approaches to digital epidemiology use <italic>passive</italic> methods by repurposing data from “a range of sources most of which do not relate to healthcare utilization” [supplementary material, 8]. In contrast, most modalities of algorithmic contact tracing can be considered <italic>active</italic> methods, as users have to enable data monitoring and sharing consciously.</p>
        <p>Algorithmic contact tracing automates the conventional contact tracing process by allowing for the collection, aggregation, and analysis of automatically generated data about a case’s contacts by a public health agency, thus eliminating the need for laborious interviews. The large volume and multimodal nature of the clinical informatics systems and epidemiological data that go along with this approach constitute a challenge that new technologies can help address [<xref ref-type="bibr" rid="ref53">53</xref>]. This applies particularly to algorithms that can quickly assess potential exposure and risk patterns while enabling faster notification to suspected contacts [<xref ref-type="bibr" rid="ref54">54</xref>]. Countries that have applied algorithmic contact tracing aggressively, by making the use of mobile phone tracing apps compulsory (eg, China and South Korea), were able to reduce daily positive cases more effectively than those that used approaches where participation was voluntary [<xref ref-type="bibr" rid="ref55">55</xref>]. While it is unclear whether the containment of case numbers can be directly attributed to algorithmic contact tracing, the use of big data to trace individuals is a commonality of the pandemic containment strategies applied by these countries [<xref ref-type="bibr" rid="ref56">56</xref>]. Further, real-world experiences with the deployment of algorithmic contact tracing illustrate the complexity of the ethical issues associated with these technologies, including the need to balance individual privacy and autonomy concerns with the utility of such data to prevent disease spread during a public health emergency [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref56">56</xref>].</p>
        <p>To reiterate, the goal of contact tracing is to identify people that <italic>had contact</italic> with each other, thereby identifying a potential path of exposure and infection. While a definition of what can be considered <italic>contact</italic> in the context of COVID-19 is still evolving [<xref ref-type="bibr" rid="ref57">57</xref>], active algorithmic contact tracing commonly uses physical proximity and duration of exposure [<xref ref-type="bibr" rid="ref58">58</xref>] as an approximation. Data gathered for algorithmic contact tracing commonly takes one of three forms: (1) proactively reported data (ie, manual digital check-ins that require participants’ compliance [<xref ref-type="bibr" rid="ref59">59</xref>]), (2) active sensor data (ie, information about an encounter with a different device utilizing the same tracing app), and (3) passive sensor data (ie, information about the geographic position of the device). These are commonly generated by devices using Bluetooth, including Bluetooth Low Energy; GPS; and Wi-Fi signal strength information [<xref ref-type="bibr" rid="ref60">60</xref>]. Bluetooth allows for active sensing, delivering information about the proximity of two sensors with submeter accuracy [<xref ref-type="bibr" rid="ref61">61</xref>,<xref ref-type="bibr" rid="ref62">62</xref>]. Passive sensing through GPS and Wi-Fi uses environmental data to approximate the geographic position of a device with relatively high precision under good conditions [<xref ref-type="bibr" rid="ref63">63</xref>,<xref ref-type="bibr" rid="ref64">64</xref>], but insufficient precision under suboptimal conditions [<xref ref-type="bibr" rid="ref65">65</xref>-<xref ref-type="bibr" rid="ref67">67</xref>]. Based on this information, an algorithmic contact tracing system can reconstruct when individual devices have been close, thereby allowing it to proactively alert those who are identified as being at risk of infection once confirmation of a positive case is made known to the system.</p>
      </sec>
      <sec>
        <title>Existing Literature on Blockchain Technology for Algorithmic Contact Tracing</title>
        <p>As previously discussed, algorithmic contact tracing is now an emerging use case for blockchain technology. However, little had been published on this topic and its application to infectious disease control before the COVID-19 pandemic, despite prior outbreaks of other diseases. One of the first contributions in this space is by Kangbai et al [<xref ref-type="bibr" rid="ref68">68</xref>], who proposed a “Blockchain platform to conduct real-time Ebola contact tracing” in the context of the 2018 outbreak of this highly virulent virus in the Democratic Republic of Congo. Subsequently, the COVID-19 pandemic has led to increased interest in the topic and several publications and preprints in the medical and engineering literature. From a systemic perspective, the dominant function of blockchains in algorithmic contact tracing is that of tamper-proof, distributed data stores for managing contact data [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref31">31</xref>-<xref ref-type="bibr" rid="ref38">38</xref>]. A less pronounced function is that of a data integration layer that allows for the exchange of medical and public health information from different sources among different actors in health care settings [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. Data that are exchanged in this way take the shape of certified COVID-19 diagnostic data [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref32">32</xref>] or immunization data [<xref ref-type="bibr" rid="ref27">27</xref>].</p>
        <p>Proposed algorithmic contact tracing blockchain systems appear as distributed architectures consisting of varying numbers of nodes in a network (see <xref rid="figure1" ref-type="fig">Figure 1</xref>). Commonly, these systems do not employ access control but, instead, grant read and write access to the public [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref33">33</xref>-<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref38">38</xref>]. Less commonly, read access is provided to the public but write access is restricted [<xref ref-type="bibr" rid="ref37">37</xref>], yet other architectures operate as private systems [<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. In most public systems, each node stores a replica of all data network-wide. Here, data are potentially encrypted and stored according to a format specific to the protocol used. In some architectures, external entities like hospitals or laboratories access the blockchain to obtain data for analysis [<xref ref-type="bibr" rid="ref37">37</xref>], potentially correlating them with data held by external EHR systems. The consensus mechanisms used for data replication between nodes are rarely discussed. Where they are, mechanisms are selected either for their performance characteristics [<xref ref-type="bibr" rid="ref25">25</xref>] or to implement authority-based forms of consensus [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]. While some proposals do not discuss the role of smart contracts [<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref38">38</xref>], many employ smart contracts to validate data on the chain [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref34">34</xref>-<xref ref-type="bibr" rid="ref36">36</xref>], mostly to prevent malicious users from inserting fabricated records of positive diagnoses into the system [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref32">32</xref>].</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>An archetype of a blockchain-based contact tracing environment derived from architectures described in the published literature. EHR: electronic health record.</p>
          </caption>
          <graphic xlink:href="publichealth_v7i4e26460_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>Proposed blockchain-based algorithmic contact tracing systems (see <xref rid="figure1" ref-type="fig">Figure 1</xref>) also generally cater to two types of actors: subjects that use contact tracing apps and, except for cases in which only self-reported data are used [<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref36">36</xref>], medical professionals that digitally attest to positive cases [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. Through their mobile devices, subjects obtain environmental signals from passive sensors [<xref ref-type="bibr" rid="ref33">33</xref>], proximity signals from active sensors [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref36">36</xref>-<xref ref-type="bibr" rid="ref38">38</xref>], or a combination of both [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>]. The data received are converted into a target format to be stored on the blockchain, the particulars of which are a key differentiator between protocols. While some protocols disregard information privacy [<xref ref-type="bibr" rid="ref33">33</xref>], more commonly, the confidential nature of tracing data is recognized and addressed by proposing formats that are deemed to prevent a subject’s privacy from being compromised.</p>
        <p>The goals of privacy-focused blockchain architectures are as follows: preventing manipulation of diagnostic data [<xref ref-type="bibr" rid="ref23">23</xref>], preventing impersonation of health authorities [<xref ref-type="bibr" rid="ref31">31</xref>], protecting the identity of infected persons [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref36">36</xref>], or, most commonly, precluding mass surveillance through the derivation of movement or contact profiles from stored data [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref38">38</xref>]. To approach these goals, various models to capture data relevant to contact tracing are proposed. Contact data commonly come in the form of contact lists using one-time pseudonyms [<xref ref-type="bibr" rid="ref23">23</xref>], pseudonymized user data combined with encrypted location information [<xref ref-type="bibr" rid="ref25">25</xref>], pseudonymized or encrypted diagnoses [<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>], or encrypted epidemiological data [<xref ref-type="bibr" rid="ref37">37</xref>].</p>
        <p>Irrespective of the format, after being generated on the user’s device, contact data are sent to the blockchain. This can happen via submission of a transaction to a public network [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref33">33</xref>-<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref38">38</xref>] or, specifically in the case of private systems where subjects do not have direct access to the blockchain [<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref37">37</xref>], by passing through an upstream application programming interface that can be operated by government bodies [<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref37">37</xref>] or by a consortium of otherwise trustworthy entities [<xref ref-type="bibr" rid="ref32">32</xref>]. The data are then replicated between nodes. In the case of a positive diagnosis for a subject, there are two alternative patterns. First, subjects can reveal their positive status on the chain proactively, oftentimes by providing some form of proof [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. Second, a pseudonymized diagnosis can be uploaded to the chain [<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref33">33</xref>] or endorsed on-chain by an authorized diagnostician [<xref ref-type="bibr" rid="ref25">25</xref>]. Subjects can then query the blockchain at intervals to obtain a risk assessment based on their previous contacts [<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref38">38</xref>] or to receive notifications [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]. The overall purpose of these proposed systems is to enable decentralized networks that can share trusted data relevant to contact tracing efforts, including self-reported data and environmental signals. Nevertheless, parameters around data storage, computation, and measures to ensure privacy-preserving processing vary and can be further modulated by developers should these be implemented.</p>
      </sec>
      <sec>
        <title>Evaluation of Applicability of Blockchain to Algorithmic Contact Tracing</title>
        <sec>
          <title>Overview</title>
          <p>Based on our review of proposed blockchain system designs for algorithmic contact tracing, we now conduct an in-depth assessment of the potential suitability and technological feasibility for their application to COVID-19 based on a technical evaluation framework. We used the Lo et al [<xref ref-type="bibr" rid="ref69">69</xref>] framework, which assesses the suitability of applying blockchain for the requirements of general use cases by posing a set of seven questions and associated decision gates to answer the question of whether blockchain or conventional databases are more suitable for a particular technology use case. These questions include the following:</p>
          <list list-type="order">
            <list-item>
              <p>Are multiple parties required?</p>
            </list-item>
            <list-item>
              <p>Is a trusted authority required?</p>
            </list-item>
            <list-item>
              <p>Are operations centralized?</p>
            </list-item>
            <list-item>
              <p>Is data transparency or confidentiality required?</p>
            </list-item>
            <list-item>
              <p>Is the integrity of transaction history required?</p>
            </list-item>
            <list-item>
              <p>Is data immutability required?</p>
            </list-item>
            <list-item>
              <p>Is high performance required?</p>
            </list-item>
          </list>
          <p>Below, we assess core blockchain features, such as decentralization, information privacy, immutability, data integration, transaction verification, and network performance, aligned with the suitability assessment and applied to the use case of algorithmic contact tracing (see <xref ref-type="table" rid="table1">Table 1</xref>).</p>
          <table-wrap position="float" id="table1">
            <label>Table 1</label>
            <caption>
              <p>Suitability evaluation of the applicability of blockchain technology to algorithmic contact tracing, with comparison to conventional database applications (CDAs).</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="400"/>
              <col width="200"/>
              <col width="400"/>
              <thead>
                <tr valign="top">
                  <td>Consideration for blockchain use cases</td>
                  <td>Evaluation</td>
                  <td>Indicated system architecture</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>Are multiple parties required?<sup>a</sup></td>
                  <td>Yes</td>
                  <td>Blockchain is preferred, but CDA is also applicable</td>
                </tr>
                <tr valign="top">
                  <td>Is a trusted authority required?<sup>a</sup></td>
                  <td>Yes</td>
                  <td>Either blockchain or CDA</td>
                </tr>
                <tr valign="top">
                  <td>Is the operation centralized?<sup>a</sup></td>
                  <td>Inconclusive</td>
                  <td>Possibly CDA, as it inherently supports centralized operations</td>
                </tr>
                <tr valign="top">
                  <td>Is transparency required?<sup>a</sup></td>
                  <td>No</td>
                  <td>CDA</td>
                </tr>
                <tr valign="top">
                  <td>Is transaction history required?<sup>a</sup></td>
                  <td>No</td>
                  <td>CDA</td>
                </tr>
                <tr valign="top">
                  <td>Is immutability required?<sup>a</sup></td>
                  <td>No</td>
                  <td>CDA</td>
                </tr>
                <tr valign="top">
                  <td>Is high performance required?<sup>a</sup></td>
                  <td>Inconclusive</td>
                  <td>Possibly CDA, as it can generally achieve higher throughput</td>
                </tr>
                <tr valign="top">
                  <td>Is integration with other systems required?</td>
                  <td>Yes</td>
                  <td>Either blockchain or CDA</td>
                </tr>
                <tr valign="top">
                  <td>Is decentralized data validation required?</td>
                  <td>No</td>
                  <td>CDA</td>
                </tr>
                <tr valign="top">
                  <td>Is high data reliability required?</td>
                  <td>Yes</td>
                  <td>CDA, as it can generally provide higher reliability of data without need for on-chain and off-chain approaches needed for blockchain</td>
                </tr>
              </tbody>
            </table>
            <table-wrap-foot>
              <fn id="table1fn1">
                <p><sup>a</sup>This consideration is based on the framework proposed by Lo et al [<xref ref-type="bibr" rid="ref69">69</xref>].</p>
              </fn>
            </table-wrap-foot>
          </table-wrap>
        </sec>
        <sec>
          <title>Multi-Party Decentralization</title>
          <p>The first question Lo et al [<xref ref-type="bibr" rid="ref69">69</xref>] raise in their framework is whether a use case requires multiple parties to be involved and, if so, whether a trusted authority is required and whether that trusted authority is decentralizable. In this context, assessing whether there is a need to operate a multi-party decentralized authority on a public or private blockchain is the first topic that needs to be addressed. Public blockchains were conceived as a design paradigm that is effective in an adversarial environment in which no central trusted party exists, and where potential malicious writers operate on the same hierarchical level as honest ones [<xref ref-type="bibr" rid="ref11">11</xref>]. In this sense, public blockchains constitute fully decentralized networks that do not require a single trusted authority to validate transactions. Private blockchains introduce some variation to this paradigm by limiting who can access a network and, in the case of private permissioned blockchains, by limiting who can participate in the consensus protocol on the network. Hence, private blockchains, and iterations of consortium blockchains—where a single entity or group controls access to the blockchain—inherently exhibit a lower degree of decentralization. Still, either paradigm can only exploit its respective strengths where there is distrust between those who write the data and where trusted third parties are absent [<xref ref-type="bibr" rid="ref70">70</xref>].</p>
          <p>The environment in which algorithmic contact tracing is conducted, however, is very different. Even though it is a multi-party environment, it requires a trusted authority (Question 2) to be involved in the validation of critical public health data, particularly in the context of addressing a pandemic. Decentralizing the role of the trusted authority may not bring with it any added benefit. For example, a multi-party public blockchain network, where patients have the same rights and responsibilities—including access to and validation of data—as medical practitioners and health authorities, is not optimal for case detection and investigation, as other potential nodes participating in the blockchain may inherently be less trustworthy. Specifically, contact tracing is generally carried out in an environment with clear hierarchies, expertise, and legal mandates that national authorities lead [<xref ref-type="bibr" rid="ref56">56</xref>]. Authorities also supervise the reporting of case numbers to other local, national, and international organizations and develop necessary calculations based on the epidemiology of the disease to assess the risk of transmission associated with the date and duration of contact with an infected individual. The hierarchical nature of this public health use case becomes particularly evident when considering the possibility of intervention by law enforcement against individuals who do not comply with public health measures [<xref ref-type="bibr" rid="ref71">71</xref>]. Health authorities are, therefore, in control of virtually all of the factors contributing to the technical success of an algorithmic contact tracing regimen, fundamentally making it a centralized problem requiring a trusted authority and centralized operation (Question 3), which may make it more suitable for conventional information management systems. Those systems commonly consist of infrastructure built around relational database management systems and application settings [<xref ref-type="bibr" rid="ref72">72</xref>] that employ access control mechanisms as mandated by legislation and regulations [<xref ref-type="bibr" rid="ref73">73</xref>].</p>
        </sec>
        <sec>
          <title>Information Privacy</title>
          <p>Algorithmic contact tracing, while having the potential to be an effective tool for controlling disease transmission [<xref ref-type="bibr" rid="ref74">74</xref>], has also been characterized, fairly or unfairly, as a potent mass surveillance tool, leading to the fear of the normalization of state-run electronic surveillance [<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref75">75</xref>-<xref ref-type="bibr" rid="ref78">78</xref>]. This can be explained by the nature of the data needed for algorithmic contact tracing, which, as discussed earlier, can manifest as location or contact data. Clarke and Wigan [<xref ref-type="bibr" rid="ref79">79</xref>] discuss why location data are particularly vulnerable by identifying specific dangers that arise from their collection. Among other factors, they discuss psychological harm through embarrassment, the danger of profiling and suspicion generation through the discovery of behavior patterns, as well as social, cultural, scientific, and economic harm arising from the knowledge or suspicion of being watched [<xref ref-type="bibr" rid="ref79">79</xref>]. While an in-depth debate of these issues is beyond the scope of this viewpoint, we discuss the influence of blockchain on information privacy by comparison to conventional, centrally managed contact tracing systems. This topic aligns with the blockchain suitability framework’s question that is focused on the tension between weighing the benefits of enhanced transparency against the needs of such systems to maintain confidentiality (Question 4) and the impact of these decisions on data governance and network performance.</p>
          <p>When operated on a public network, blockchain poses significant challenges for engaging with privacy-sensitive data, including protected health information. While proposed blockchain-based systems for contact tracing commonly address the privacy of tracing data through cryptographic protocols [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref38">38</xref>], their effectiveness in an adversarial environment has to be approached with concern for three reasons:</p>
          <list list-type="order">
            <list-item>
              <p>Cryptanalysis can bring to light deficiencies in cryptographic protocols previously believed to be secure, potentially revealing data that were believed to be protected from attackers [<xref ref-type="bibr" rid="ref80">80</xref>].</p>
            </list-item>
            <list-item>
              <p>Even protocols that apply data hygiene diligently by “minimizing or eliminating personally identifiable data of...subjects” [<xref ref-type="bibr" rid="ref81">81</xref>] and appear unproblematic with regard to privacy might be vulnerable to abuse by methods not yet known, potentially through correlation with data from other sources not yet considered [<xref ref-type="bibr" rid="ref82">82</xref>].</p>
            </list-item>
            <list-item>
              <p>The cryptographic integrity of today’s blockchain protocols is threatened by methods of quantum computing [<xref ref-type="bibr" rid="ref83">83</xref>].</p>
            </list-item>
          </list>
          <p>It is, therefore, inadvisable to make any data related to contact tracing, even if considered harmless or undecryptable by today’s methods, available beyond completely trustworthy parties that have a legitimate <italic>need to know</italic>, irrespective of whether data are stored in a conventional or decentralized system.</p>
          <p>When operated as a private network, blockchain systems generally have a weak negative effect on information privacy: while more finely grained controls of data access in blockchain are possible through permission structures [<xref ref-type="bibr" rid="ref84">84</xref>], typically, all nodes in a private blockchain network have visibility of network-wide data. Storing only a hash or a similarly obfuscated datum on-chain and keeping sensitive health-related or individually identifiable data off-chain, including approaches that use off-chain blockchain storage and computation, can improve confidentiality. However, this requires the application of appropriate hash algorithms and randomization techniques [<xref ref-type="bibr" rid="ref85">85</xref>]. Moreover, obfuscation can diminish the utility of said data and can inhibit network performance, including when data are encrypted [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref69">69</xref>]. Though privacy-preserving approaches to managing health care data leveraging different combinations of off-chain and on-chain storage are possible, their application requires careful design and mapping to appropriate legal and privacy frameworks specific to particular health care use cases and types of data [<xref ref-type="bibr" rid="ref9">9</xref>]. Given the highly sensitive nature of contact tracing data, confidentiality considerations appear to outweigh the benefits of blockchain-mediated distributed trust and transparency.</p>
        </sec>
        <sec>
          <title>Data Integrity and Immutability</title>
          <p>An original principle and key value proposition of blockchain systems is their ability to provide data integrity and immutability through creating provenance by linking of transaction blocks [<xref ref-type="bibr" rid="ref11">11</xref>], which means that data appended to the blockchain cannot be deleted or changed trivially and can, therefore, be considered final in most circumstances [<xref ref-type="bibr" rid="ref86">86</xref>]. While alternative designs providing mutability have been proposed [<xref ref-type="bibr" rid="ref87">87</xref>], the applications discussed here consider blockchain as a near-immutable technology and emphasize this quality. This aligns with key decision points in the assessment of suitability for use cases (Questions 5 and 6). Immutability has practical disadvantages in an algorithmic contact tracing context since data cannot be expunged after the incubation period. This means that contact records that no longer serve the purpose of enabling contact tracing may still be present in such systems, potentially threatening the privacy of those that reported them or negatively impacting blockchain system performance (Question 7).</p>
          <p>Further, proposed applications commonly embrace the <italic>tamper-proof</italic> nature of contact tracing data on the blockchain. This is largely due to the abstract threat of an attacker tampering with tracing data or the risk of having a trusted authority as a single point of failure. However, in the context of digital contact tracing, data integrity and immutability are of less concern than accuracy and correctness, which are decisive factors for predicting chains of transmission. By their nature, data on confirmed cases should come from trusted centralized sources (eg, health authorities). Therefore, the need to establish data provenance by ensuring the integrity of the transaction history through establishing consensus system-wide is rendered of low importance. Unlike other health care use cases, such as enabling enhanced track and trace of pharmaceuticals in the global supply chain, contact tracing data are not a physical asset that requires tracking changes to its access, ownership, and transfer [<xref ref-type="bibr" rid="ref88">88</xref>].</p>
          <p>As discussed, common blockchain protocols aim to achieve immutability of data recorded [<xref ref-type="bibr" rid="ref89">89</xref>] and, should the need for correcting existing records arise, address it by appending updated records to the blockchain. This stands in contrast to centralized data storage systems in which records can simply be deleted or corrected. Consequently, data hygiene is hard to achieve in blockchain-based algorithmic contact tracing systems, as those might retain tracing data for longer than medically necessary, simply because the technical capabilities to delete them are not given. Incorrect or inconsistent testing results, or duplicates occurring during integration and consolidation of contact tracing data from different jurisdictions and agencies, are equally harder to correct in an immutable setting [<xref ref-type="bibr" rid="ref69">69</xref>].</p>
        </sec>
        <sec>
          <title>Performance</title>
          <p>Performance (Question 7) is recognized as one of the major challenges for real-world implementation of blockchain systems [<xref ref-type="bibr" rid="ref90">90</xref>]. This can be attributed to challenges associated with their scalability [<xref ref-type="bibr" rid="ref91">91</xref>], particularly in the context of modulating between on-chain and off-chain storage and computation [<xref ref-type="bibr" rid="ref9">9</xref>]. Although scale has been achieved in some blockchain applications in the financial sector by applying partitioning [<xref ref-type="bibr" rid="ref92">92</xref>] or second-level protocols like <italic>side chains</italic> [<xref ref-type="bibr" rid="ref93">93</xref>], performance may be negatively impacted by the need to achieve consensus among network members during record creation. Achieving consensus is a complex problem to which different blockchain protocols offer different solutions with varying performance characteristics [<xref ref-type="bibr" rid="ref94">94</xref>]. In the context of algorithmic contact tracing, throughput (ie, the number of transactions that can be executed per unit of time) can be considered the most relevant approximation of overall performance. What all consensus protocols have in common is that coordination among nodes or members is required, which imposes penalties on throughput in exchange for distributed networks of shared trust. Penalties are particularly severe on major public permissionless blockchains, where data validation and replication are subject to <italic>proof-of-work</italic> or <italic>chain-based proof-of-stake</italic> consensus protocols that are characterized by allowing a throughput of only tens of transactions per second [<xref ref-type="bibr" rid="ref95">95</xref>].</p>
          <p>For example, while permissioned blockchains can provide significant performance benefits over their permissionless counterparts [<xref ref-type="bibr" rid="ref96">96</xref>], achieving around 1000 transactions per second in some common configurations [<xref ref-type="bibr" rid="ref97">97</xref>], they are still inferior to traditional replicated databases, particularly when multi-leader strategies with low consistency levels are applied, as these can support throughputs above 15,000 operations per second even under challenging workloads [<xref ref-type="bibr" rid="ref98">98</xref>]. Therefore, traditional database systems can more effectively address the use case of contact tracing in which data validation, where necessary, can be performed centrally by the appropriate authority. Throughput is critical in the context of algorithmic contact tracing infrastructures, especially where vast populations generate large volumes of contact data rapidly and where privacy requirements will inevitably require off-chain storage and computation. Despite the lack of a standardized workload that would be necessary to conclusively answer this question, it can be speculated that private blockchains may have the capability of handling contact tracing data volumes, at least on a regional scale. Nevertheless, the fact that they do not provide a throughput benefit over traditional database systems minimizes their suitability from a performance perspective.</p>
        </sec>
        <sec>
          <title>Other Evaluation Considerations</title>
          <p>In addition to the evaluation based on the framework proposed by Lo et al [<xref ref-type="bibr" rid="ref69">69</xref>], further aspects are relevant for assessing blockchain’s suitability for enhancing algorithmic contact tracing. These aspects include data integration, transaction verification, and data reliability as discussed in this section.</p>
          <p>The further processing of data gathered via algorithmic contact tracing is largely a problem of data integration (ie, one of combining tracing data with data from different sources, for example, diagnostic data from COVID-19 testing centers and clinical data from EHRs). Here, blockchain can provide benefits by defining a standardized format for transaction data payloads and standard processing logic via smart contracts. Efforts to address data integration are underway, as exemplified by emerging standards at the intersection of blockchain and pandemic and epidemic surveillance [<xref ref-type="bibr" rid="ref99">99</xref>]. There are, however, challenges concerning the integration with existing health record management systems, such as the cost of change incurred [<xref ref-type="bibr" rid="ref100">100</xref>], ensuring regulatory compliance of an integrated information technology environment [<xref ref-type="bibr" rid="ref101">101</xref>], dealing with privacy and confidentiality policies specific to health information (eg, implications of the Health Insurance Portability and Accountability Act in the United States [<xref ref-type="bibr" rid="ref102">102</xref>] and the General Data Protection Regulation in the European Union [<xref ref-type="bibr" rid="ref103">103</xref>]), or the immaturity of proposed standards that is detrimental to achieving interoperability [<xref ref-type="bibr" rid="ref104">104</xref>].</p>
          <p><italic>Smart contracts</italic> [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref105">105</xref>] constitute agreements that are executed without the involvement of the concerned parties as part of a blockchain protocol. They are a key component of many distributed applications and can be implemented in various programming languages following different paradigms that come with various security features [<xref ref-type="bibr" rid="ref106">106</xref>]. The common element is that they allow application developers to encode the logic that governs what constitutes a legitimate transaction on the blockchain. Such logic can validate endorsement policies and rules concerning data integrity, thereby ensuring the added content’s correctness. Rules around data audit and system access that in centralized systems are commonly enforced by role-based access control mechanisms [<xref ref-type="bibr" rid="ref107">107</xref>] could also be executed through smart contracts [<xref ref-type="bibr" rid="ref108">108</xref>]. Conceivably, in the case of a contact tracing app, smart contracts could be developed by a trusted vendor and audited by a credible authority. Further confidence in its correct execution could be gained through formal verification [<xref ref-type="bibr" rid="ref109">109</xref>]. Still, even in a flawless implementation, smart contracts can only be exploited partially here. While they provide value as a means of ensuring that confirmed case data originate from trusted sources and have not been tampered with, most contact tracing data are user generated and based on signals from outside of the system (eg, pseudonyms of devices in close proximity or geographic locations). For such data, a smart contract differentiating between a legitimate data set and an illegitimate one can, at best, be heuristic. This diminishes the usefulness of the transaction verification capabilities provided by blockchain technology.</p>
          <p>Data reliability can be considered essential in contact tracing, where a loss of recent contact data could lead to participants at risk of infection going unnotified. Nodes on a public blockchain network can leave and join at will without risking data loss. Commonly, data are fully replicated between existing nodes and those who join the network. This technique allows for high degrees of redundancy, especially on public blockchains where the number of replicating nodes can be very large (eg, up to 23,000 in the case of Bitcoin [<xref ref-type="bibr" rid="ref110">110</xref>]). Private blockchain deployments can run in arbitrary topologies, which makes the degree of redundancy they provide contingent on the configuration chosen by the designer of the system. Redundancy positively influences availability, as clients can select an alternative replica to interact with, in case of failure. This is, however, not a unique benefit of blockchain. High reliability can also be achieved via more traditional centralized data replication protocols used in the context of cloud computing, where data redundancy levels are often configurable [<xref ref-type="bibr" rid="ref111">111</xref>].</p>
        </sec>
      </sec>
    </sec>
    <sec>
      <title>Conclusions</title>
      <p>Blockchain, although not in productive use in this context, has increasingly been discussed as a technology to support algorithmic contact tracing efforts targeting COVID-19. A question resulting from this trend is whether this technology can replace or enhance the centralized architectures that are operational today. To address this question, we examined blockchain-based contact tracing concepts discussed in the literature. Upon realizing similarities in their design, we derived an archetypal system architecture capturing their common characteristics. Subsequently, guided by an evaluation framework, we explored the potential benefits of this system architecture over conventional approaches to data storage. The results of this suitability evaluation indicate that blockchain-based protocols as currently presented do not provide benefits significant enough to warrant the prioritization of their implementation. This is primarily due to the incongruity between the centralization of organizational and administrative processes surrounding contact tracing and the decentralized nature of blockchain technology. Further technical arguments in support of this result are concerns about the impact of blockchain on the privacy of personal data, unclear benefits of blockchain’s key features (ie, enhancing transparency, data provenance, and immutability), the challenges around integrating blockchain systems with existing sources of the health dataverse in legally compliant ways, and a lack of performance benefits over conventional information management systems. The result of the suitability analysis is reinforced by the fact that conventional, centralized, algorithmic contact tracing systems are already integral parts of the pandemic mitigation strategies of some of the countries that are most successful in controlling the spread of COVID-19. Instead of focusing on algorithmic contact tracing, future efforts to leverage blockchain technology in the fight against COVID-19 could turn to the assessment of other promising use cases for suitability. Health supply chain management, digital immunization passports, and the management of digital identity in the context of COVID-19 patient journeys are areas where blockchain might be more appropriate, not least because investments in technology infrastructure and stakeholder buy-in are more mature here.</p>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">ASCLEPIOS</term>
          <def>
            <p>Advanced Secure Cloud Encrypted Platform for Internationally Orchestrated Solutions in Healthcare</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">EHR</term>
          <def>
            <p>electronic health record</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>We thank Peter McBurney for sharing his views on information privacy that inspired us to strengthen the conclusions of this paper. We thank Gennaro Avitabile, Paulo Valente Klaine, Leonie Reichert, and Hao Xu for their helpful comments. This work was partly funded by the Advanced Secure Cloud Encrypted Platform for Internationally Orchestrated Solutions in Healthcare (ASCLEPIOS) project (grant 826093) via the European Union’s Horizon 2020 research and innovation program.</p>
    </ack>
    <fn-group>
      <fn fn-type="con">
        <p>MP wrote the initial draft of the manuscript. AH, TM, JRB, MTO, and HCR contributed additional content, edits, and references. SDO and ERM contributed edits and references. All authors approved the final draft.</p>
      </fn>
      <fn fn-type="conflict">
        <p>TM is an employee of S-3 Research LLC, which is a start-up company funded and currently supported by the National Institutes of Health, National Institute on Drug Abuse, through a Small Business Innovation and Research contract for opioid-related social media research and technology commercialization. The author reports no other conflict of interest associated with this manuscript and has not been asked by any organization to be named on or to submit this manuscript. The other authors have no conflicts to declare.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Morens</surname>
              <given-names>DM</given-names>
            </name>
            <name name-style="western">
              <surname>Fauci</surname>
              <given-names>AS</given-names>
            </name>
          </person-group>
          <article-title>Emerging pandemic diseases: How we got to COVID-19</article-title>
          <source>Cell</source>
          <year>2020</year>
          <month>09</month>
          <day>03</day>
          <volume>182</volume>
          <issue>5</issue>
          <fpage>1077</fpage>
          <lpage>1092</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32846157"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.cell.2020.08.021</pub-id>
          <pub-id pub-id-type="medline">32846157</pub-id>
          <pub-id pub-id-type="pii">S0092-8674(20)31012-6</pub-id>
          <pub-id pub-id-type="pmcid">PMC7428724</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="web">
          <article-title>COVID-19 situation update worldwide</article-title>
          <source>European Centre for Disease Prevention and Control</source>
          <year>2021</year>
          <access-date>2021-02-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ecdc.europa.eu/en/geographical-distribution-2019-ncov-cases">https://www.ecdc.europa.eu/en/geographical-distribution-2019-ncov-cases</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cherry</surname>
              <given-names>JD</given-names>
            </name>
            <name name-style="western">
              <surname>Krogstad</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>SARS: The first pandemic of the 21st century</article-title>
          <source>Pediatr Res</source>
          <year>2004</year>
          <month>07</month>
          <volume>56</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>5</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/15152053"/>
          </comment>
          <pub-id pub-id-type="doi">10.1203/01.PDR.0000129184.87042.FC</pub-id>
          <pub-id pub-id-type="medline">15152053</pub-id>
          <pub-id pub-id-type="pii">01.PDR.0000129184.87042.FC</pub-id>
          <pub-id pub-id-type="pmcid">PMC7086556</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yamey</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Schäferhoff</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Aars</surname>
              <given-names>OK</given-names>
            </name>
            <name name-style="western">
              <surname>Bloom</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Carroll</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Chawla</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Dzau</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Echalar</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Gill</surname>
              <given-names>IS</given-names>
            </name>
            <name name-style="western">
              <surname>Godal</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Gupta</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Jamison</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Kelley</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Kristensen</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Mundaca-Shah</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Oppenheim</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Pavlin</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Salvado</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Sands</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Schmunis</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Soucat</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Summers</surname>
              <given-names>LH</given-names>
            </name>
            <name name-style="western">
              <surname>El Turabi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Waldman</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Whiting</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Financing of international collective action for epidemic and pandemic preparedness</article-title>
          <source>Lancet Glob Health</source>
          <year>2017</year>
          <month>08</month>
          <volume>5</volume>
          <issue>8</issue>
          <fpage>e742</fpage>
          <lpage>e744</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2214-109X(17)30203-6"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/S2214-109X(17)30203-6</pub-id>
          <pub-id pub-id-type="medline">28528866</pub-id>
          <pub-id pub-id-type="pii">S2214-109X(17)30203-6</pub-id>
          <pub-id pub-id-type="pmcid">PMC7128558</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Holmgren</surname>
              <given-names>AJ</given-names>
            </name>
            <name name-style="western">
              <surname>Apathy</surname>
              <given-names>NC</given-names>
            </name>
            <name name-style="western">
              <surname>Adler-Milstein</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Barriers to hospital electronic public health reporting and implications for the COVID-19 pandemic</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2020</year>
          <month>08</month>
          <day>01</day>
          <volume>27</volume>
          <issue>8</issue>
          <fpage>1306</fpage>
          <lpage>1309</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32442266"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamia/ocaa112</pub-id>
          <pub-id pub-id-type="medline">32442266</pub-id>
          <pub-id pub-id-type="pii">5842141</pub-id>
          <pub-id pub-id-type="pmcid">PMC7313984</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Downey</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>‘Excel-gate’ highlights need for ‘quality technical capability’ in NHS</article-title>
          <source>Digital Health</source>
          <year>2020</year>
          <month>10</month>
          <day>09</day>
          <access-date>2021-03-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.digitalhealth.net/2020/10/excel-gate-highlights-need-for-quality-technical-capability-in-nhs">https://www.digitalhealth.net/2020/10/excel-gate-highlights-need-for-quality-technical-capability-in-nhs</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Arriagada Bruneau</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Gilthorpe</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Müller</surname>
              <given-names>VC</given-names>
            </name>
          </person-group>
          <article-title>The ethical imperatives of the COVID-19 pandemic: A review from data ethics</article-title>
          <source>Veritas</source>
          <year>2020</year>
          <month>08</month>
          <volume>46</volume>
          <fpage>13</fpage>
          <lpage>35</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://scielo.conicyt.cl/scielo.php?script=sci_arttext&#38;pid=S0718-92732020000200013&#38;lng=en&#38;nrm=iso&#38;tlng=en"/>
          </comment>
          <pub-id pub-id-type="doi">10.4067/s0718-92732020000200013</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mello</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>CJ</given-names>
            </name>
          </person-group>
          <article-title>Ethics and governance for digital disease surveillance</article-title>
          <source>Science</source>
          <year>2020</year>
          <month>05</month>
          <day>29</day>
          <volume>368</volume>
          <issue>6494</issue>
          <fpage>951</fpage>
          <lpage>954</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://science.sciencemag.org/content/sci/368/6494/951.full.pdf"/>
          </comment>
          <pub-id pub-id-type="doi">10.1126/science.abb9045</pub-id>
          <pub-id pub-id-type="medline">32393527</pub-id>
          <pub-id pub-id-type="pii">science.abb9045</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Miyachi</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Mackey</surname>
              <given-names>TK</given-names>
            </name>
          </person-group>
          <article-title>hOCBS: A privacy-preserving blockchain framework for healthcare data leveraging an on-chain and off-chain system design</article-title>
          <source>Inf Process Manag</source>
          <year>2021</year>
          <month>05</month>
          <volume>58</volume>
          <issue>3</issue>
          <fpage>102535</fpage>
          <pub-id pub-id-type="doi">10.1016/j.ipm.2021.102535</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tai</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Eberhardt</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Klems</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Not ACID, not BASE, but SALT: A transaction processing perspective on blockchains</article-title>
          <source>Proceedings of the 7th International Conference on Cloud Computing and Services Science</source>
          <year>2017</year>
          <conf-name>7th International Conference on Cloud Computing and Services Science</conf-name>
          <conf-date>April 24-26, 2017</conf-date>
          <conf-loc>Porto, Portugal</conf-loc>
          <publisher-name>ACM</publisher-name>
          <fpage>755</fpage>
          <lpage>764</lpage>
          <pub-id pub-id-type="doi">10.5220/0006408207550764</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nakamoto</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Bitcoin: A peer-to-peer electronic cash system</article-title>
          <source>Bitcoin</source>
          <year>2008</year>
          <access-date>2021-03-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bitcoin.org/bitcoin.pdf">https://bitcoin.org/bitcoin.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lamport</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Shostak</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Pease</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>The Byzantine generals problem</article-title>
          <source>ACM Trans Program Lang Syst</source>
          <year>1982</year>
          <month>07</month>
          <volume>4</volume>
          <issue>3</issue>
          <fpage>382</fpage>
          <lpage>401</lpage>
          <pub-id pub-id-type="doi">10.1145/357172.357176</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Douceur</surname>
              <given-names>JR</given-names>
            </name>
          </person-group>
          <article-title>The Sybil attack</article-title>
          <source>Proceedings of the 1st International Workshop on Peer-to-Peer Systems</source>
          <year>2002</year>
          <conf-name>1st International Workshop on Peer-to-Peer Systems</conf-name>
          <conf-date>March 7-8, 2002</conf-date>
          <conf-loc>Cambridge, MA</conf-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>251</fpage>
          <lpage>260</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Szabo</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Formalizing and securing relationships on public networks</article-title>
          <source>First Monday</source>
          <year>1997</year>
          <month>09</month>
          <volume>2</volume>
          <issue>9</issue>
          <fpage>1</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.uic.edu/ojs/index.php/fm/article/view/548/469"/>
          </comment>
          <pub-id pub-id-type="doi">10.5210/fm.v2i9.548</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nguyen</surname>
              <given-names>GT</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>A survey about consensus algorithms used in blockchain</article-title>
          <source>J Inf Process Syst</source>
          <year>2018</year>
          <volume>14</volume>
          <issue>1</issue>
          <fpage>101</fpage>
          <lpage>128</lpage>
          <pub-id pub-id-type="doi">10.3745/jips.01.0024</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Platt</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>McBurney</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Self-governing public decentralised systems: Work in progress</article-title>
          <source>Proceedings of the 10th International Workshop on Socio-Technical Aspects in Security</source>
          <year>2020</year>
          <conf-name>10th International Workshop on Socio-Technical Aspects in Security</conf-name>
          <conf-date>September 17, 2020</conf-date>
          <conf-loc>Guildford, UK</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://kclpure.kcl.ac.uk/portal/files/136350337/2020_self_governing_public_decentralised_systems.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oliveira</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Carrara</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Fernandes</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Albuquerque</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Carrano</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Medeiros</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Mattos</surname>
              <given-names>DMF</given-names>
            </name>
          </person-group>
          <article-title>Towards a performance evaluation of private blockchain frameworks using a realistic workload</article-title>
          <source>Proceedings of the 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)</source>
          <year>2019</year>
          <conf-name>22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)</conf-name>
          <conf-date>February 19-21, 2019</conf-date>
          <conf-loc>Paris, France</conf-loc>
          <publisher-name>IEEE</publisher-name>
          <fpage>180</fpage>
          <lpage>187</lpage>
          <pub-id pub-id-type="doi">10.1109/icin.2019.8685888</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dimitrov</surname>
              <given-names>DV</given-names>
            </name>
          </person-group>
          <article-title>Blockchain applications for healthcare data management</article-title>
          <source>Healthc Inform Res</source>
          <year>2019</year>
          <month>01</month>
          <volume>25</volume>
          <issue>1</issue>
          <fpage>51</fpage>
          <lpage>56</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.e-hir.org/DOIx.php?id=10.4258/hir.2019.25.1.51"/>
          </comment>
          <pub-id pub-id-type="doi">10.4258/hir.2019.25.1.51</pub-id>
          <pub-id pub-id-type="medline">30788182</pub-id>
          <pub-id pub-id-type="pmcid">PMC6372466</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hussien</surname>
              <given-names>HM</given-names>
            </name>
            <name name-style="western">
              <surname>Yasin</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Udzir</surname>
              <given-names>SNI</given-names>
            </name>
            <name name-style="western">
              <surname>Zaidan</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>Zaidan</surname>
              <given-names>BB</given-names>
            </name>
          </person-group>
          <article-title>A systematic review for enabling of develop a blockchain technology in healthcare application: Taxonomy, substantially analysis, motivations, challenges, recommendations and future direction</article-title>
          <source>J Med Syst</source>
          <year>2019</year>
          <month>09</month>
          <day>14</day>
          <volume>43</volume>
          <issue>10</issue>
          <fpage>320</fpage>
          <pub-id pub-id-type="doi">10.1007/s10916-019-1445-8</pub-id>
          <pub-id pub-id-type="medline">31522262</pub-id>
          <pub-id pub-id-type="pii">10.1007/s10916-019-1445-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mackey</surname>
              <given-names>TK</given-names>
            </name>
            <name name-style="western">
              <surname>Kuo</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Gummadi</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Clauson</surname>
              <given-names>KA</given-names>
            </name>
            <name name-style="western">
              <surname>Church</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Grishin</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Obbad</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Barkovich</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Palombini</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>'Fit-for-purpose?' - Challenges and opportunities for applications of blockchain technology in the future of healthcare</article-title>
          <source>BMC Med</source>
          <year>2019</year>
          <month>03</month>
          <day>27</day>
          <volume>17</volume>
          <issue>1</issue>
          <fpage>68</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedicine.biomedcentral.com/articles/10.1186/s12916-019-1296-7"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12916-019-1296-7</pub-id>
          <pub-id pub-id-type="medline">30914045</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12916-019-1296-7</pub-id>
          <pub-id pub-id-type="pmcid">PMC6436239</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hasselgren</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kralevska</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Gligoroski</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Pedersen</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>Faxvaag</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Blockchain in healthcare and health sciences-A scoping review</article-title>
          <source>Int J Med Inform</source>
          <year>2020</year>
          <month>02</month>
          <volume>134</volume>
          <fpage>104040</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1386-5056(19)30526-X"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2019.104040</pub-id>
          <pub-id pub-id-type="medline">31865055</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(19)30526-X</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vazirani</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>O'Donoghue</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Brindley</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Meinert</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Implementing blockchains for efficient health care: Systematic review</article-title>
          <source>J Med Internet Res</source>
          <year>2019</year>
          <month>02</month>
          <day>12</day>
          <volume>21</volume>
          <issue>2</issue>
          <fpage>e12439</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2019/2/e12439/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/12439</pub-id>
          <pub-id pub-id-type="medline">30747714</pub-id>
          <pub-id pub-id-type="pii">v21i2e12439</pub-id>
          <pub-id pub-id-type="pmcid">PMC6390185</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Arifeen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Al Mamun</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kaiser</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Mahmud</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Blockchain-enable contact tracing for preserving user privacy during COVID-19 outbreak</article-title>
          <source>Preprints.</source>
          <comment>Preprint posted online on July 22, 2020
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tinyurl.com/wdehjmh5"/>
          </comment>
          <pub-id pub-id-type="doi">10.20944/preprints202007.0502.v1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Micali</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Algorand's approach to COVID-19 reporting</article-title>
          <source>Algorand</source>
          <year>2020</year>
          <access-date>2021-03-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.algorand.com/algorand's%20approach%20to%20COVID-19%20Tracing%20042520.pdf">https://www.algorand.com/algorand's%20approach%20to%20COVID-19%20Tracing%20042520.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Onireti</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Fang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Buchanan</surname>
              <given-names>WJ</given-names>
            </name>
            <name name-style="western">
              <surname>Imran</surname>
              <given-names>MA</given-names>
            </name>
          </person-group>
          <article-title>BeepTrace: Blockchain-enabled privacy-preserving contact tracing for COVID-19 pandemic and beyond</article-title>
          <source>IEEE Internet Things J</source>
          <year>2021</year>
          <month>3</month>
          <volume>8</volume>
          <issue>5</issue>
          <fpage>3915</fpage>
          <lpage>3929</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&#38;arnumber=9203904"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/jiot.2020.3025953</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Idrees</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Nowostawski</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Jameel</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Blockchain-based digital contact tracing apps for COVID-19 pandemic management: Issues, challenges, solutions, and future directions</article-title>
          <source>JMIR Med Inform</source>
          <year>2021</year>
          <month>03</month>
          <day>09</day>
          <volume>9</volume>
          <issue>2</issue>
          <fpage>e25245</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://medinform.jmir.org/2021/2/e25245/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/25245</pub-id>
          <pub-id pub-id-type="medline">33400677</pub-id>
          <pub-id pub-id-type="pii">v9i2e25245</pub-id>
          <pub-id pub-id-type="pmcid">PMC7875568</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bansal</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Garg</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Padappayil</surname>
              <given-names>RP</given-names>
            </name>
          </person-group>
          <article-title>Optimizing the implementation of COVID-19 "immunity certificates" using blockchain</article-title>
          <source>J Med Syst</source>
          <year>2020</year>
          <month>07</month>
          <day>19</day>
          <volume>44</volume>
          <issue>9</issue>
          <fpage>140</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32683501"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s10916-020-01616-4</pub-id>
          <pub-id pub-id-type="medline">32683501</pub-id>
          <pub-id pub-id-type="pii">10.1007/s10916-020-01616-4</pub-id>
          <pub-id pub-id-type="pmcid">PMC7368854</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kalla</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hewa</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Mishra</surname>
              <given-names>RA</given-names>
            </name>
            <name name-style="western">
              <surname>Ylianttila</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Liyanage</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>The role of blockchain to fight against COVID-19</article-title>
          <source>IEEE Eng Manag Rev</source>
          <year>2020</year>
          <month>9</month>
          <day>1</day>
          <volume>48</volume>
          <issue>3</issue>
          <fpage>85</fpage>
          <lpage>96</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&#38;arnumber=9157910"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/emr.2020.3014052</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Marbouh</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Abbasi</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Maasmi</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Omar</surname>
              <given-names>IA</given-names>
            </name>
            <name name-style="western">
              <surname>Debe</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Salah</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Jayaraman</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Ellahham</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Blockchain for COVID-19: Review, opportunities, and a trusted tracking system</article-title>
          <source>Arab J Sci Eng</source>
          <year>2020</year>
          <month>10</month>
          <day>12</day>
          <fpage>1</fpage>
          <lpage>17</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/33072472"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s13369-020-04950-4</pub-id>
          <pub-id pub-id-type="medline">33072472</pub-id>
          <pub-id pub-id-type="pii">4950</pub-id>
          <pub-id pub-id-type="pmcid">PMC7549424</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Karopoulos</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Hernández-Ramos</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Kambourakis</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Nai Fovino</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Demystifying COVID-19 digital contact tracing: A survey on frameworks and mobile apps</article-title>
          <source>Wirel Commun Mob Comput</source>
          <year>2020</year>
          <month>10</month>
          <day>17</day>
          <volume>2020</volume>
          <fpage>1</fpage>
          <lpage>29</lpage>
          <pub-id pub-id-type="doi">10.1155/2020/8851429</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Klaine</surname>
              <given-names>PV</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Imran</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Privacy-preserving contact tracing and public risk assessment using blockchain for COVID-19 pandemic</article-title>
          <source>IEEE Internet Things Mag</source>
          <year>2020</year>
          <month>9</month>
          <volume>3</volume>
          <issue>3</issue>
          <fpage>58</fpage>
          <lpage>63</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&#38;arnumber=9241473"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/iotm.0001.2000078</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Avitabile</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Botta</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Iovino</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Visconti</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Towards defeating mass surveillance and SARS-CoV-2: The Pronto-C2 fully decentralized automatic contact tracing system</article-title>
          <source>Cryptology ePrint Archive.</source>
          <comment>Preprint posted online on April 27, 2020
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://eprint.iacr.org/2020/493.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hossain</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Muhammad</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Guizani</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Explainable AI and mass surveillance system-based healthcare framework to combat COVID-19 like pandemics</article-title>
          <source>IEEE Netw</source>
          <year>2020</year>
          <month>7</month>
          <volume>34</volume>
          <issue>4</issue>
          <fpage>126</fpage>
          <lpage>132</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&#38;arnumber=9136589"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/mnet.011.2000458</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Garg</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Chukwu</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Nasser</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Chakraborty</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Garg</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Anonymity preserving IoT-based COVID-19 and other infectious disease contact tracing model</article-title>
          <source>IEEE Access</source>
          <year>2020</year>
          <volume>8</volume>
          <fpage>159402</fpage>
          <lpage>159414</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&#38;arnumber=9181512"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/access.2020.3020513</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lv</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Jiang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Cui</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Qiu</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Decentralized blockchain for privacy-preserving large-scale contact tracing</article-title>
          <source>ArXiv.</source>
          <comment>Preprint posted online on July 2, 2020
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/pdf/2007.00894.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Song</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Gu</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Feng</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Ge</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Mohapatra</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Blockchain meets COVID-19: A framework for contact information sharing and risk notification system</article-title>
          <source>ArXiv.</source>
          <comment>Preprint posted online on July 20, 2020</comment>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Choudhury</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Goswami</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Gurung</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>CovidChain: An anonymity preserving blockchain based framework for protection against COVID-19</article-title>
          <source>ArXiv.</source>
          <comment>Preprint posted online on May 15, 2020
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/pdf/2005.10607.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>JK</given-names>
            </name>
            <name name-style="western">
              <surname>Au</surname>
              <given-names>MH</given-names>
            </name>
            <name name-style="western">
              <surname>Yuen</surname>
              <given-names>TH</given-names>
            </name>
            <name name-style="western">
              <surname>Zuo</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Sakzad</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Luo</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Privacy-preserving COVID-19 contact tracing app: A zero-knowledge proof approach</article-title>
          <source>Cryptology ePrint Archive.</source>
          <comment>Preprint posted online on May 5, 2020
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://eprint.iacr.org/2020/528.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kirch</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Kirch</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Contact tracing</article-title>
          <source>Encyclopedia of Public Health</source>
          <year>2008</year>
          <publisher-loc>Dordrecht, the Netherlands</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>164</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eames</surname>
              <given-names>KTD</given-names>
            </name>
            <name name-style="western">
              <surname>Keeling</surname>
              <given-names>MJ</given-names>
            </name>
          </person-group>
          <article-title>Contact tracing and disease control</article-title>
          <source>Proc Biol Sci</source>
          <year>2003</year>
          <month>12</month>
          <day>22</day>
          <volume>270</volume>
          <issue>1533</issue>
          <fpage>2565</fpage>
          <lpage>2571</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/14728778"/>
          </comment>
          <pub-id pub-id-type="doi">10.1098/rspb.2003.2554</pub-id>
          <pub-id pub-id-type="medline">14728778</pub-id>
          <pub-id pub-id-type="pmcid">PMC1691540</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Day</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Covid-19: Four fifths of cases are asymptomatic, China figures indicate</article-title>
          <source>BMJ</source>
          <year>2020</year>
          <month>04</month>
          <day>02</day>
          <volume>369</volume>
          <fpage>m1375</fpage>
          <pub-id pub-id-type="doi">10.1136/bmj.m1375</pub-id>
          <pub-id pub-id-type="medline">32241884</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hasell</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Mathieu</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Beltekian</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Macdonald</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Giattino</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ortiz-Ospina</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Roser</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ritchie</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>A cross-country database of COVID-19 testing</article-title>
          <source>Sci Data</source>
          <year>2020</year>
          <month>10</month>
          <day>08</day>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>345</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1038/s41597-020-00688-8"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41597-020-00688-8</pub-id>
          <pub-id pub-id-type="medline">33033256</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41597-020-00688-8</pub-id>
          <pub-id pub-id-type="pmcid">PMC7545176</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Salathé</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Althaus</surname>
              <given-names>CL</given-names>
            </name>
            <name name-style="western">
              <surname>Neher</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Stringhini</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Hodcroft</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Fellay</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Zwahlen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Senti</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Battegay</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wilder-Smith</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Eckerle</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Egger</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Low</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>COVID-19 epidemic in Switzerland: On the importance of testing, contact tracing and isolation</article-title>
          <source>Swiss Med Wkly</source>
          <year>2020</year>
          <month>03</month>
          <day>09</day>
          <volume>150</volume>
          <fpage>w20225</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.emh.ch/10.4414/smw.2020.20225"/>
          </comment>
          <pub-id pub-id-type="doi">10.4414/smw.2020.20225</pub-id>
          <pub-id pub-id-type="medline">32191813</pub-id>
          <pub-id pub-id-type="pii">Swiss Med Wkly. 2020;150:w20225</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Russell</surname>
              <given-names>TW</given-names>
            </name>
            <name name-style="western">
              <surname>Golding</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Hellewell</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Abbott</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Wright</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Pearson</surname>
              <given-names>CAB</given-names>
            </name>
            <name name-style="western">
              <surname>van Zandvoort</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Jarvis</surname>
              <given-names>CI</given-names>
            </name>
            <name name-style="western">
              <surname>Gibbs</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Eggo</surname>
              <given-names>RM</given-names>
            </name>
            <name name-style="western">
              <surname>Edmunds</surname>
              <given-names>WJ</given-names>
            </name>
            <name name-style="western">
              <surname>Kucharski</surname>
              <given-names>AJ</given-names>
            </name>
            <collab>CMMID COVID-19 Working Group</collab>
          </person-group>
          <article-title>Reconstructing the early global dynamics of under-ascertained COVID-19 cases and infections</article-title>
          <source>BMC Med</source>
          <year>2020</year>
          <month>10</month>
          <day>22</day>
          <volume>18</volume>
          <issue>1</issue>
          <fpage>332</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedicine.biomedcentral.com/articles/10.1186/s12916-020-01790-9"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12916-020-01790-9</pub-id>
          <pub-id pub-id-type="medline">33087179</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12916-020-01790-9</pub-id>
          <pub-id pub-id-type="pmcid">PMC7577796</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wilder-Smith</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Freedman</surname>
              <given-names>DO</given-names>
            </name>
          </person-group>
          <article-title>Isolation, quarantine, social distancing and community containment: Pivotal role for old-style public health measures in the novel coronavirus (2019-nCoV) outbreak</article-title>
          <source>J Travel Med</source>
          <year>2020</year>
          <month>03</month>
          <day>13</day>
          <volume>27</volume>
          <issue>2</issue>
          <fpage>taaa020</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32052841"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jtm/taaa020</pub-id>
          <pub-id pub-id-type="medline">32052841</pub-id>
          <pub-id pub-id-type="pii">5735321</pub-id>
          <pub-id pub-id-type="pmcid">PMC7107565</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mooney</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>"A menace to the public health" - Contact tracing and the limits of persuasion</article-title>
          <source>N Engl J Med</source>
          <year>2020</year>
          <month>11</month>
          <day>05</day>
          <volume>383</volume>
          <issue>19</issue>
          <fpage>1806</fpage>
          <lpage>1808</lpage>
          <pub-id pub-id-type="doi">10.1056/NEJMp2021887</pub-id>
          <pub-id pub-id-type="medline">32877577</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wójcik</surname>
              <given-names>OP</given-names>
            </name>
            <name name-style="western">
              <surname>Brownstein</surname>
              <given-names>JS</given-names>
            </name>
            <name name-style="western">
              <surname>Chunara</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Johansson</surname>
              <given-names>MA</given-names>
            </name>
          </person-group>
          <article-title>Public health for the people: Participatory infectious disease surveillance in the digital age</article-title>
          <source>Emerg Themes Epidemiol</source>
          <year>2014</year>
          <volume>11</volume>
          <fpage>7</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ete-online.biomedcentral.com/articles/10.1186/1742-7622-11-7"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/1742-7622-11-7</pub-id>
          <pub-id pub-id-type="medline">24991229</pub-id>
          <pub-id pub-id-type="pii">1742-7622-11-7</pub-id>
          <pub-id pub-id-type="pmcid">PMC4078360</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O'Shea</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Digital disease detection: A systematic review of event-based internet biosurveillance systems</article-title>
          <source>Int J Med Inform</source>
          <year>2017</year>
          <month>05</month>
          <volume>101</volume>
          <fpage>15</fpage>
          <lpage>22</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28347443"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2017.01.019</pub-id>
          <pub-id pub-id-type="medline">28347443</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(17)30030-8</pub-id>
          <pub-id pub-id-type="pmcid">PMC7108385</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <article-title>Contact transmission of COVID-19 in South Korea: Novel investigation techniques for tracing contacts</article-title>
          <source>Osong Public Health Res Perspect</source>
          <year>2020</year>
          <month>03</month>
          <volume>11</volume>
          <issue>1</issue>
          <fpage>60</fpage>
          <lpage>63</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32149043"/>
          </comment>
          <pub-id pub-id-type="doi">10.24171/j.phrp.2020.11.1.09</pub-id>
          <pub-id pub-id-type="medline">32149043</pub-id>
          <pub-id pub-id-type="pii">ophrp-11-60</pub-id>
          <pub-id pub-id-type="pmcid">PMC7045882</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smieszek</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Castell</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Barrat</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Cattuto</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>White</surname>
              <given-names>PJ</given-names>
            </name>
            <name name-style="western">
              <surname>Krause</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Contact diaries versus wearable proximity sensors in measuring contact patterns at a conference: Method comparison and participants' attitudes</article-title>
          <source>BMC Infect Dis</source>
          <year>2016</year>
          <month>07</month>
          <day>22</day>
          <volume>16</volume>
          <fpage>341</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcinfectdis.biomedcentral.com/articles/10.1186/s12879-016-1676-y"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12879-016-1676-y</pub-id>
          <pub-id pub-id-type="medline">27449511</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12879-016-1676-y</pub-id>
          <pub-id pub-id-type="pmcid">PMC4957345</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Armbruster</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Brandeau</surname>
              <given-names>ML</given-names>
            </name>
          </person-group>
          <article-title>Contact tracing to control infectious disease: When enough is enough</article-title>
          <source>Health Care Manag Sci</source>
          <year>2007</year>
          <month>12</month>
          <volume>10</volume>
          <issue>4</issue>
          <fpage>341</fpage>
          <lpage>355</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/18074967"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s10729-007-9027-6</pub-id>
          <pub-id pub-id-type="medline">18074967</pub-id>
          <pub-id pub-id-type="pmcid">PMC3428220</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Armstrong</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>The rise of surveillance medicine</article-title>
          <source>Sociol Health Illn</source>
          <year>1995</year>
          <month>06</month>
          <volume>17</volume>
          <issue>3</issue>
          <fpage>393</fpage>
          <lpage>404</lpage>
          <pub-id pub-id-type="doi">10.1111/1467-9566.ep10933329</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Roman-Belmonte</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>De la Corte-Rodriguez</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Rodriguez-Merchan</surname>
              <given-names>EC</given-names>
            </name>
          </person-group>
          <article-title>How blockchain technology can change medicine</article-title>
          <source>Postgrad Med</source>
          <year>2018</year>
          <month>05</month>
          <volume>130</volume>
          <issue>4</issue>
          <fpage>420</fpage>
          <lpage>427</lpage>
          <pub-id pub-id-type="doi">10.1080/00325481.2018.1472996</pub-id>
          <pub-id pub-id-type="medline">29727247</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Venkataraman</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Poon</surname>
              <given-names>BH</given-names>
            </name>
            <name name-style="western">
              <surname>Siau</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Innovative use of health informatics to augment contact tracing during the COVID-19 pandemic in an acute hospital</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2020</year>
          <month>12</month>
          <day>09</day>
          <volume>27</volume>
          <issue>12</issue>
          <fpage>1964</fpage>
          <lpage>1967</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32835358"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamia/ocaa184</pub-id>
          <pub-id pub-id-type="medline">32835358</pub-id>
          <pub-id pub-id-type="pii">5896533</pub-id>
          <pub-id pub-id-type="pmcid">PMC7499570</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bianconi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Marcelli</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Campi</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Perali</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Efficiency of COVID-19 mobile contact tracing containment by measuring time-dependent doubling time</article-title>
          <source>Phys Biol</source>
          <year>2020</year>
          <month>10</month>
          <day>09</day>
          <volume>17</volume>
          <issue>6</issue>
          <fpage>065006</fpage>
          <pub-id pub-id-type="doi">10.1088/1478-3975/abac51</pub-id>
          <pub-id pub-id-type="medline">32750685</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Hou</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Combat COVID-19 with artificial intelligence and big data</article-title>
          <source>J Travel Med</source>
          <year>2020</year>
          <month>08</month>
          <day>20</day>
          <volume>27</volume>
          <issue>5</issue>
          <fpage>taaa080</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32437541"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jtm/taaa080</pub-id>
          <pub-id pub-id-type="medline">32437541</pub-id>
          <pub-id pub-id-type="pii">5841603</pub-id>
          <pub-id pub-id-type="pmcid">PMC7313798</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Morawska</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Milton</surname>
              <given-names>DK</given-names>
            </name>
          </person-group>
          <article-title>It is time to address airborne transmission of coronavirus disease 2019 (COVID-19)</article-title>
          <source>Clin Infect Dis</source>
          <year>2020</year>
          <month>12</month>
          <day>03</day>
          <volume>71</volume>
          <issue>9</issue>
          <fpage>2311</fpage>
          <lpage>2313</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32628269"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/cid/ciaa939</pub-id>
          <pub-id pub-id-type="medline">32628269</pub-id>
          <pub-id pub-id-type="pii">5867798</pub-id>
          <pub-id pub-id-type="pmcid">PMC7454469</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Leith</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Farrell</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Google/Apple exposure notification due diligence</article-title>
          <source>Proceedings of the CoronaDef Workshop, Network and Distributed System Security Symposium (NDSS)</source>
          <year>2021</year>
          <conf-name>CoronaDef Workshop, Network and Distributed System Security Symposium (NDSS)</conf-name>
          <conf-date>February 21, 2021</conf-date>
          <conf-loc>Virtual</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ndss-symposium.org/wp-content/uploads/coronadef2021_23005_paper.pdf"/>
          </comment>
          <pub-id pub-id-type="doi">10.14722/coronadef.2021.23005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hoffman</surname>
              <given-names>AS</given-names>
            </name>
            <name name-style="western">
              <surname>Jacobs</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>van Gastel</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Schraffenberger</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Sharon</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Pas</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Towards a seamful ethics of Covid-19 contact tracing apps?</article-title>
          <source>Ethics Inf Technol</source>
          <year>2020</year>
          <month>09</month>
          <day>28</day>
          <fpage>1</fpage>
          <lpage>11</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/33013191"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s10676-020-09559-7</pub-id>
          <pub-id pub-id-type="medline">33013191</pub-id>
          <pub-id pub-id-type="pii">9559</pub-id>
          <pub-id pub-id-type="pmcid">PMC7521862</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Reichert</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Brack</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Scheuermann</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>A survey of automatic contact tracing approaches using Bluetooth Low Energy</article-title>
          <source>ACM Trans Comput Healthc</source>
          <year>2021</year>
          <month>03</month>
          <volume>2</volume>
          <issue>2</issue>
          <fpage>1</fpage>
          <lpage>33</lpage>
          <pub-id pub-id-type="doi">10.1145/3444847</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Raghavan</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ananthapadmanaban</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Sivamurugan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ravindran</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Accurate mobile robot localization in indoor environments using Bluetooth</article-title>
          <source>Proceedings of the 2010 International Conference on Robotics and Automation</source>
          <year>2010</year>
          <conf-name>2010 International Conference on Robotics and Automation</conf-name>
          <conf-date>May 3-7, 2010</conf-date>
          <conf-loc>Anchorage, AK</conf-loc>
          <publisher-name>IEEE</publisher-name>
          <fpage>4391</fpage>
          <lpage>4396</lpage>
          <pub-id pub-id-type="doi">10.1109/robot.2010.5509232</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bertuletti</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Cereatti</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Caldara</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Galizzi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Croce</surname>
              <given-names>U</given-names>
            </name>
          </person-group>
          <article-title>Indoor distance estimated from Bluetooth Low Energy signal strength: Comparison of regression models</article-title>
          <source>Proceedings of the 2016 Sensors Applications Symposium (SAS)</source>
          <year>2016</year>
          <conf-name>2016 Sensors Applications Symposium (SAS)</conf-name>
          <conf-date>April 20-22, 2016</conf-date>
          <conf-loc>Catania, Italy</conf-loc>
          <publisher-name>IEEE</publisher-name>
          <fpage>1</fpage>
          <lpage>5</lpage>
          <pub-id pub-id-type="doi">10.1109/sas.2016.7479899</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Merry</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Bettinger</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Smartphone GPS accuracy study in an urban environment</article-title>
          <source>PLoS One</source>
          <year>2019</year>
          <volume>14</volume>
          <issue>7</issue>
          <fpage>e0219890</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pone.0219890"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pone.0219890</pub-id>
          <pub-id pub-id-type="medline">31318933</pub-id>
          <pub-id pub-id-type="pii">PONE-D-18-35623</pub-id>
          <pub-id pub-id-type="pmcid">PMC6638960</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jung</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Bell</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Petrenko</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Sizo</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Potential risks of WiFi-based indoor positioning and progress on improving localization functionality</article-title>
          <source>Proceedings of the 4th International Workshop on Indoor Spatial Awareness</source>
          <year>2012</year>
          <conf-name>4th International Workshop on Indoor Spatial Awareness</conf-name>
          <conf-date>November 6, 2012</conf-date>
          <conf-loc>Redondo Beach, CA</conf-loc>
          <publisher-name>ACM</publisher-name>
          <fpage>13</fpage>
          <lpage>20</lpage>
          <pub-id pub-id-type="doi">10.1145/2442616.2442621</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schipperijn</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kerr</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Duncan</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Madsen</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Klinker</surname>
              <given-names>CD</given-names>
            </name>
            <name name-style="western">
              <surname>Troelsen</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Dynamic accuracy of GPS receivers for use in health research: A novel method to assess GPS accuracy in real-world settings</article-title>
          <source>Front Public Health</source>
          <year>2014</year>
          <volume>2</volume>
          <fpage>21</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.3389/fpubh.2014.00021"/>
          </comment>
          <pub-id pub-id-type="doi">10.3389/fpubh.2014.00021</pub-id>
          <pub-id pub-id-type="medline">24653984</pub-id>
          <pub-id pub-id-type="pmcid">PMC3948045</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chadha</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>The global positioning system: Challenges in bringing GPS to mainstream consumers</article-title>
          <source>Proceedings of the 1998 International Solid-State Circuits Conference</source>
          <year>1998</year>
          <conf-name>1998 International Solid-State Circuits Conference</conf-name>
          <conf-date>February 5-7, 1998</conf-date>
          <conf-loc>San Francisco, CA</conf-loc>
          <publisher-name>IEEE</publisher-name>
          <fpage>26</fpage>
          <lpage>28</lpage>
          <pub-id pub-id-type="doi">10.1109/isscc.1998.672333</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Deng</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Mo</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Placement of access points for indoor wireless coverage and fingerprint-based localization</article-title>
          <source>Proceedings of the 10th International Conference on Embedded and Ubiquitous Computing</source>
          <year>2013</year>
          <conf-name>10th International Conference on Embedded and Ubiquitous Computing</conf-name>
          <conf-date>November 13-15, 2013</conf-date>
          <conf-loc>Zhangjiajie, China</conf-loc>
          <publisher-name>IEEE</publisher-name>
          <fpage>2253</fpage>
          <lpage>2257</lpage>
          <pub-id pub-id-type="doi">10.1109/hpcc.and.euc.2013.323</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kangbai</surname>
              <given-names>JB</given-names>
            </name>
            <name name-style="western">
              <surname>Jame</surname>
              <given-names>PB</given-names>
            </name>
            <name name-style="western">
              <surname>Mandoh</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Fofanah</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>George</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Briama</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Massaquoi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>McBrayer</surname>
              <given-names>JL</given-names>
            </name>
          </person-group>
          <article-title>Tracking Ebola through cellphone, Internet of Things and Blockchain technology</article-title>
          <source>Curr Res Integr Med</source>
          <year>2018</year>
          <volume>1</volume>
          <issue>2</issue>
          <fpage>13</fpage>
          <lpage>15</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.pulsus.com/scholarly-articles/tracking-ebola-through-cellphone-internet-of-things-and-blockchain-technology-4810.html"/>
          </comment>
          <pub-id pub-id-type="doi">10.4172/2529-797x.1000035</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lo</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Chiam</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Lu</surname>
              <given-names>Q</given-names>
            </name>
          </person-group>
          <article-title>Evaluating suitability of applying Blockchain</article-title>
          <source>Proceedings of the 22nd International Conference on Engineering of Complex Computer Systems</source>
          <year>2017</year>
          <conf-name>22nd International Conference on Engineering of Complex Computer Systems</conf-name>
          <conf-date>November 5-8, 2017</conf-date>
          <conf-loc>Fukuoka, Japan</conf-loc>
          <publisher-name>ACM</publisher-name>
          <fpage>158</fpage>
          <lpage>161</lpage>
          <pub-id pub-id-type="doi">10.1109/iceccs.2017.26</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wüst</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Gervais</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Do you need a Blockchain?</article-title>
          <source>Proceedings of the 2018 Crypto Valley Conference on Blockchain Technology (CVCBT)</source>
          <year>2018</year>
          <conf-name>2018 Crypto Valley Conference on Blockchain Technology (CVCBT)</conf-name>
          <conf-date>June 20-22, 2018</conf-date>
          <conf-loc>Zug, Switzerland</conf-loc>
          <publisher-name>IEEE</publisher-name>
          <fpage>45</fpage>
          <lpage>54</lpage>
          <pub-id pub-id-type="doi">10.1109/cvcbt.2018.00011</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gostin</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Sapsin</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Vernick</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Teret</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Burris</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>SARS and international legal preparedness</article-title>
          <source>Temple Law Rev</source>
          <year>2004</year>
          <volume>77</volume>
          <fpage>155</fpage>
          <lpage>174</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://scholarship.law.georgetown.edu/cgi/viewcontent.cgi?article=1349&#38;context=facpub"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ogbuji</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Özsu</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Clinical data acquisition, storage and management</article-title>
          <source>Encyclopedia of Database Systems</source>
          <year>2016</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ferreira</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Correia</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Chadwick</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Antunes</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Access control in healthcare: The methodology from legislation to practice</article-title>
          <source>Stud Health Technol Inform</source>
          <year>2010</year>
          <volume>160</volume>
          <issue>Pt 1</issue>
          <fpage>666</fpage>
          <lpage>670</lpage>
          <pub-id pub-id-type="medline">20841770</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ferretti</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Wymant</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Kendall</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Nurtay</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Abeler-Dörner</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Parker</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bonsall</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Fraser</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing</article-title>
          <source>Science</source>
          <year>2020</year>
          <month>05</month>
          <day>08</day>
          <volume>368</volume>
          <issue>6491</issue>
          <fpage>eabb6936</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32234805"/>
          </comment>
          <pub-id pub-id-type="doi">10.1126/science.abb6936</pub-id>
          <pub-id pub-id-type="medline">32234805</pub-id>
          <pub-id pub-id-type="pii">science.abb6936</pub-id>
          <pub-id pub-id-type="pmcid">PMC7164555</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Couch</surname>
              <given-names>DL</given-names>
            </name>
            <name name-style="western">
              <surname>Robinson</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Komesaroff</surname>
              <given-names>PA</given-names>
            </name>
          </person-group>
          <article-title>COVID-19-extending surveillance and the panopticon</article-title>
          <source>J Bioeth Inq</source>
          <year>2020</year>
          <month>12</month>
          <volume>17</volume>
          <issue>4</issue>
          <fpage>809</fpage>
          <lpage>814</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32840859"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s11673-020-10036-5</pub-id>
          <pub-id pub-id-type="medline">32840859</pub-id>
          <pub-id pub-id-type="pii">10.1007/s11673-020-10036-5</pub-id>
          <pub-id pub-id-type="pmcid">PMC7445799</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Csernatoni</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>New states of emergency: Normalizing techno-surveillance in the time of COVID-19</article-title>
          <source>Glob Aff</source>
          <year>2020</year>
          <month>10</month>
          <day>02</day>
          <volume>6</volume>
          <issue>3</issue>
          <fpage>301</fpage>
          <lpage>310</lpage>
          <pub-id pub-id-type="doi">10.1080/23340460.2020.1825108</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ram</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Gray</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Mass surveillance in the age of COVID-19</article-title>
          <source>J Law Biosci</source>
          <year>2020</year>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>lsaa023</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32728466"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jlb/lsaa023</pub-id>
          <pub-id pub-id-type="medline">32728466</pub-id>
          <pub-id pub-id-type="pii">lsaa023</pub-id>
          <pub-id pub-id-type="pmcid">PMC7239102</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Taddeo</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>The ethical governance of the digital during and after the COVID-19 pandemic</article-title>
          <source>Minds Mach (Dordr)</source>
          <year>2020</year>
          <month>06</month>
          <day>12</day>
          <fpage>1</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32836869"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s11023-020-09528-5</pub-id>
          <pub-id pub-id-type="medline">32836869</pub-id>
          <pub-id pub-id-type="pii">9528</pub-id>
          <pub-id pub-id-type="pmcid">PMC7289936</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Clarke</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Wigan</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>You are where you’ve been: The privacy implications of location and tracking technologies</article-title>
          <source>J Location Based Serv</source>
          <year>2011</year>
          <month>09</month>
          <volume>5</volume>
          <issue>3-4</issue>
          <fpage>138</fpage>
          <lpage>155</lpage>
          <pub-id pub-id-type="doi">10.1080/17489725.2011.637969</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dooley</surname>
              <given-names>JF</given-names>
            </name>
          </person-group>
          <article-title>Introduction: A revolutionary cipher</article-title>
          <source>History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms</source>
          <year>2018</year>
          <publisher-loc>Cham, Switzerland</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>1</fpage>
          <lpage>11</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref81">
        <label>81</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fischer-Hübner</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Özsu</surname>
              <given-names>MT</given-names>
            </name>
          </person-group>
          <article-title>Privacy-enhancing technologies</article-title>
          <source>Encyclopedia of Database Systems</source>
          <year>2017</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>1</fpage>
          <lpage>7</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref82">
        <label>82</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Harron</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Dibben</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Boyd</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hjern</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Azimaee</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Barreto</surname>
              <given-names>ML</given-names>
            </name>
            <name name-style="western">
              <surname>Goldstein</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Challenges in administrative data linkage for research</article-title>
          <source>Big Data Soc</source>
          <year>2017</year>
          <month>12</month>
          <day>05</day>
          <volume>4</volume>
          <issue>2</issue>
          <fpage>1</fpage>
          <lpage>12</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tinyurl.com/acfw38pv"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/2053951717745678</pub-id>
          <pub-id pub-id-type="medline">30381794</pub-id>
          <pub-id pub-id-type="pmcid">PMC6187070</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref83">
        <label>83</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fedorov</surname>
              <given-names>AK</given-names>
            </name>
            <name name-style="western">
              <surname>Kiktenko</surname>
              <given-names>EO</given-names>
            </name>
            <name name-style="western">
              <surname>Lvovsky</surname>
              <given-names>AI</given-names>
            </name>
          </person-group>
          <article-title>Quantum computers put blockchain security at risk</article-title>
          <source>Nature</source>
          <year>2018</year>
          <month>11</month>
          <volume>563</volume>
          <issue>7732</issue>
          <fpage>465</fpage>
          <lpage>467</lpage>
          <pub-id pub-id-type="doi">10.1038/d41586-018-07449-z</pub-id>
          <pub-id pub-id-type="medline">30451981</pub-id>
          <pub-id pub-id-type="pii">10.1038/d41586-018-07449-z</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref84">
        <label>84</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Peng</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Feng</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Yan</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Shimizu</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Privacy preservation in permissionless blockchain: A survey</article-title>
          <source>Digit Commun Netw</source>
          <year>2020</year>
          <month>6</month>
          <fpage>1</fpage>
          <lpage>13</lpage>
          <comment>(forthcoming)<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tinyurl.com/cmtywhkj"/></comment>
          <pub-id pub-id-type="doi">10.1016/j.dcan.2020.05.008</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref85">
        <label>85</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Marx</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Zimmer</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Mueller</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Blochberger</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Federrath</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Hashing of personally identifiable information is not sufficient</article-title>
          <source>Proceedings of the 9th Annual Conference of the Security Department</source>
          <year>2018</year>
          <conf-name>9th Annual Conference of the Security Department</conf-name>
          <conf-date>April 25-27, 2018</conf-date>
          <conf-loc>Konstanz, Germany</conf-loc>
          <publisher-name>Gesellschaft für Informatik e.V</publisher-name>
          <fpage>55</fpage>
          <lpage>68</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dl.gi.de/bitstream/handle/20.500.12116/16294/sicherheit2018-04.pdf?sequence=1&#38;isAllowed=y"/>
          </comment>
          <pub-id pub-id-type="doi">10.18420/sicherheit2018_04</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref86">
        <label>86</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wandhofer</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Berndsen</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Proof-of-work blockchains and settlement finality: A functional interpretation</article-title>
          <source>J Financ Mark Infrastructures</source>
          <year>2019</year>
          <volume>7</volume>
          <issue>4</issue>
          <fpage>71</fpage>
          <lpage>104</lpage>
          <pub-id pub-id-type="doi">10.21314/jfmi.2018.111</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref87">
        <label>87</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Politou</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Casino</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Alepis</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Patsakis</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Blockchain mutability: Challenges and proposed solutions</article-title>
          <source>IEEE Trans Emerg Top Comput</source>
          <year>2019</year>
          <fpage>1</fpage>
          <pub-id pub-id-type="doi">10.1109/tetc.2019.2949510</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref88">
        <label>88</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Clauson</surname>
              <given-names>KA</given-names>
            </name>
            <name name-style="western">
              <surname>Breeden</surname>
              <given-names>EA</given-names>
            </name>
            <name name-style="western">
              <surname>Davidson</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Mackey</surname>
              <given-names>TK</given-names>
            </name>
          </person-group>
          <article-title>Leveraging blockchain technology to enhance supply chain management in healthcare: An exploration of challenges and opportunities in the health supply chain</article-title>
          <source>Blockchain Healthc Today</source>
          <year>2018</year>
          <month>03</month>
          <day>23</day>
          <volume>1</volume>
          <fpage>1</fpage>
          <lpage>12</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://blockchainhealthcaretoday.com/index.php/journal/article/view/20/7"/>
          </comment>
          <pub-id pub-id-type="doi">10.30953/bhty.v1.20</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref89">
        <label>89</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hofmann</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Wurster</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ron</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Böhmecke-Schwafert</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>The immutability concept of blockchains and benefits of early standardization</article-title>
          <source>Proceedings of the 2017 ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K)</source>
          <year>2017</year>
          <conf-name>2017 ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K)</conf-name>
          <conf-date>November 27-29, 2017</conf-date>
          <conf-loc>Nanjing, China</conf-loc>
          <publisher-name>IEEE</publisher-name>
          <fpage>1</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.23919/itu-wt.2017.8247004</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref90">
        <label>90</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Si</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>A survey on challenges and progresses in blockchain technologies: A performance and security perspective</article-title>
          <source>Appl Sci</source>
          <year>2019</year>
          <month>11</month>
          <day>06</day>
          <volume>9</volume>
          <issue>22</issue>
          <fpage>4731</fpage>
          <pub-id pub-id-type="doi">10.3390/app9224731</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref91">
        <label>91</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sohrabi</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Tari</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>On the scalability of blockchain systems</article-title>
          <source>Proceedings of the 2020 IEEE International Conference on Cloud Engineering (IC2E)</source>
          <year>2020</year>
          <conf-name>2020 IEEE International Conference on Cloud Engineering (IC2E)</conf-name>
          <conf-date>April 21-24, 2020</conf-date>
          <conf-loc>Sydney, Australia</conf-loc>
          <publisher-name>IEEE</publisher-name>
          <fpage>124</fpage>
          <lpage>133</lpage>
          <pub-id pub-id-type="doi">10.1109/ic2e48712.2020.00020</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref92">
        <label>92</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dang</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Dinh</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Loghin</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Chang</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Ooi</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Towards scaling blockchain systems via sharding</article-title>
          <source>Proceedings of the 2019 International Conference on Management of Data</source>
          <year>2019</year>
          <conf-name>2019 International Conference on Management of Data</conf-name>
          <conf-date>June 30-July 5, 2019</conf-date>
          <conf-loc>Amsterdam, the Netherlands</conf-loc>
          <publisher-name>Association for Computing Machinery</publisher-name>
          <fpage>123</fpage>
          <lpage>140</lpage>
          <pub-id pub-id-type="doi">10.1145/3299869.3319889</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref93">
        <label>93</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Click</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Parizi</surname>
              <given-names>RM</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Dehghantanha</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Choo</surname>
              <given-names>KR</given-names>
            </name>
          </person-group>
          <article-title>Sidechain technologies in blockchain networks: An examination and state-of-the-art review</article-title>
          <source>J Netw Comput Appl</source>
          <year>2020</year>
          <month>01</month>
          <volume>149</volume>
          <fpage>102471</fpage>
          <pub-id pub-id-type="doi">10.1016/j.jnca.2019.102471</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref94">
        <label>94</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xiao</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Lou</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Hou</surname>
              <given-names>YT</given-names>
            </name>
          </person-group>
          <article-title>A survey of distributed consensus protocols for blockchain networks</article-title>
          <source>IEEE Commun Surv Tutor</source>
          <year>2020</year>
          <volume>22</volume>
          <issue>2</issue>
          <fpage>1432</fpage>
          <lpage>1465</lpage>
          <pub-id pub-id-type="doi">10.1109/comst.2020.2969706</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref95">
        <label>95</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lepore</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ceria</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Visconti</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Rao</surname>
              <given-names>UP</given-names>
            </name>
            <name name-style="western">
              <surname>Shah</surname>
              <given-names>KA</given-names>
            </name>
            <name name-style="western">
              <surname>Zanolini</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS</article-title>
          <source>Mathematics</source>
          <year>2020</year>
          <month>10</month>
          <day>14</day>
          <volume>8</volume>
          <issue>10</issue>
          <fpage>1782</fpage>
          <pub-id pub-id-type="doi">10.3390/math8101782</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref96">
        <label>96</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dabbagh</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Choo</surname>
              <given-names>KR</given-names>
            </name>
            <name name-style="western">
              <surname>Beheshti</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Tahir</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Safa</surname>
              <given-names>NS</given-names>
            </name>
          </person-group>
          <article-title>A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities</article-title>
          <source>Comput Secur</source>
          <year>2021</year>
          <month>01</month>
          <volume>100</volume>
          <fpage>102078</fpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2020.102078</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref97">
        <label>97</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hao</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Dong</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Fang</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Performance analysis of consensus algorithm in private blockchain</article-title>
          <source>Proceedings of the 2018 Intelligent Vehicles Symposium</source>
          <year>2018</year>
          <conf-name>2018 Intelligent Vehicles Symposium</conf-name>
          <conf-date>June 26-30, 2018</conf-date>
          <conf-loc>Changshu, China</conf-loc>
          <publisher-name>IEEE</publisher-name>
          <fpage>280</fpage>
          <lpage>285</lpage>
          <pub-id pub-id-type="doi">10.1109/ivs.2018.8500557</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref98">
        <label>98</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Haughian</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Osman</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Knottenbelt</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Benchmarking replication in Cassandra and MongoDB NoSQL datastores</article-title>
          <source>Proceedings of the 27th International Conference on Database and Expert Systems Applications</source>
          <year>2016</year>
          <conf-name>27th International Conference on Database and Expert Systems Applications</conf-name>
          <conf-date>September 5-8, 2016</conf-date>
          <conf-loc>Porto, Portugal</conf-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>152</fpage>
          <lpage>166</lpage>
          <pub-id pub-id-type="doi">10.1007/978-3-319-44406-2_12</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref99">
        <label>99</label>
        <nlm-citation citation-type="web">
          <article-title>Standard for blockchain-based omnidirectional pandemic/epidemic surveillance: Overarching framework</article-title>
          <source>IEEE Standards Association</source>
          <year>2020</year>
          <access-date>2021-03-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://standards.ieee.org/project/2677_1.html">https://standards.ieee.org/project/2677_1.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref100">
        <label>100</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pirtle</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ehrenfeld</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Blockchain for healthcare: The next generation of medical records?</article-title>
          <source>J Med Syst</source>
          <year>2018</year>
          <month>08</month>
          <day>10</day>
          <volume>42</volume>
          <issue>9</issue>
          <fpage>172</fpage>
          <pub-id pub-id-type="doi">10.1007/s10916-018-1025-3</pub-id>
          <pub-id pub-id-type="medline">30097733</pub-id>
          <pub-id pub-id-type="pii">10.1007/s10916-018-1025-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref101">
        <label>101</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vazirani</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>O'Donoghue</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Brindley</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Meinert</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Blockchain vehicles for efficient medical record management</article-title>
          <source>NPJ Digit Med</source>
          <year>2020</year>
          <volume>3</volume>
          <fpage>1</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1038/s41746-019-0211-0"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41746-019-0211-0</pub-id>
          <pub-id pub-id-type="medline">31934645</pub-id>
          <pub-id pub-id-type="pii">211</pub-id>
          <pub-id pub-id-type="pmcid">PMC6944683</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref102">
        <label>102</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Colin</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Young</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Blockchain and the protection of patient information in line with HIPAA</article-title>
          <source>Int J Cyber Res Educ</source>
          <year>2019</year>
          <volume>1</volume>
          <issue>1</issue>
          <fpage>63</fpage>
          <lpage>68</lpage>
          <pub-id pub-id-type="doi">10.4018/ijcre.2019010107</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref103">
        <label>103</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Van Humbeeck</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The Blockchain-GDPR paradox</article-title>
          <source>J Data Prot Priv</source>
          <year>2019</year>
          <volume>2</volume>
          <fpage>12</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref104">
        <label>104</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>El-Gazzar</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Stendal</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Blockchain in health care: Hope or hype?</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>07</month>
          <day>10</day>
          <volume>22</volume>
          <issue>7</issue>
          <fpage>e17199</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/7/e17199/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/17199</pub-id>
          <pub-id pub-id-type="medline">32673219</pub-id>
          <pub-id pub-id-type="pii">v22i7e17199</pub-id>
          <pub-id pub-id-type="pmcid">PMC7382018</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref105">
        <label>105</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <collab>Smith</collab>
          </person-group>
          <article-title>The contract net protocol: High-level communication and control in a distributed problem solver</article-title>
          <source>IEEE Trans Comput</source>
          <year>1980</year>
          <month>12</month>
          <volume>C-29</volume>
          <issue>12</issue>
          <fpage>1104</fpage>
          <lpage>1113</lpage>
          <pub-id pub-id-type="doi">10.1109/tc.1980.1675516</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref106">
        <label>106</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Harz</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Knottenbelt</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Towards safer smart contracts: A survey of languages and verification methods</article-title>
          <source>ArXiv.</source>
          <comment>Preprint posted online on November 1, 2018
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/pdf/1809.09805"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref107">
        <label>107</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fernández-Alemán</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Señor</surname>
              <given-names>IC</given-names>
            </name>
            <name name-style="western">
              <surname>Lozoya</surname>
              <given-names>PÁO</given-names>
            </name>
            <name name-style="western">
              <surname>Toval</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Security and privacy in electronic health records: A systematic literature review</article-title>
          <source>J Biomed Inform</source>
          <year>2013</year>
          <month>06</month>
          <volume>46</volume>
          <issue>3</issue>
          <fpage>541</fpage>
          <lpage>562</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(12)00186-4"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbi.2012.12.003</pub-id>
          <pub-id pub-id-type="medline">23305810</pub-id>
          <pub-id pub-id-type="pii">S1532-0464(12)00186-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref108">
        <label>108</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cruz</surname>
              <given-names>JP</given-names>
            </name>
            <name name-style="western">
              <surname>Kaji</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Yanai</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>RBAC-SC: Role-based access control using smart contract</article-title>
          <source>IEEE Access</source>
          <year>2018</year>
          <volume>6</volume>
          <fpage>12240</fpage>
          <lpage>12251</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2018.2812844</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref109">
        <label>109</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mavridou</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Laszka</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Stachtiari</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Dubey</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>VeriSolid: Correct-by-design smart contracts for Ethereum</article-title>
          <source>Proceedings of the 23rd International Conference on Financial Cryptography and Data Security</source>
          <year>2019</year>
          <conf-name>23rd International Conference on Financial Cryptography and Data Security</conf-name>
          <conf-date>February 18-22, 2019</conf-date>
          <conf-loc>Frigate Bay, St. Kitts and Nevis</conf-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>446</fpage>
          <lpage>465</lpage>
          <pub-id pub-id-type="doi">10.1007/978-3-030-32101-7_27</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref110">
        <label>110</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Park</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Im</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Seol</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Paek</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Nodes in the Bitcoin network: Comparative measurement study and survey</article-title>
          <source>IEEE Access</source>
          <year>2019</year>
          <volume>7</volume>
          <fpage>57009</fpage>
          <lpage>57022</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2019.2914098</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref111">
        <label>111</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Li</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Yuan</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Literature review</article-title>
          <source>Reliability Assurance of Big Data in the Cloud: Cost-Effective Replication-Based Storage</source>
          <year>2015</year>
          <publisher-loc>Waltham, MA</publisher-loc>
          <publisher-name>Morgan Kaufmann</publisher-name>
          <fpage>9</fpage>
          <lpage>17</lpage>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
