Who Stores the Private Key? An Exploratory Study about User Preferences of Key Management for Blockchain-based Applications Topics: Authentication, Privacy and Security Models; Cryptographic Algorithms; Distributed Ledgers and Blockchain Technologies and Applications; Security Architecture and Design Analysis; Trusted Computing In Proceedings of the 7th International Conference on Information Systems Security and Privacy ICISSP - Volume 1, 23-32, 2021