{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T15:04:55Z","timestamp":1767625495595,"version":"3.37.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242954"},{"type":"electronic","value":"9783030242961"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24296-1_37","type":"book-chapter","created":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T21:06:36Z","timestamp":1561755996000},"page":"472-484","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Self-Sovereign Identity for IoT Devices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5380-2096","authenticated-orcid":false,"given":"Nataliia","family":"Kulabukhova","sequence":"first","affiliation":[]},{"given":"Andrei","family":"Ivashchenko","sequence":"additional","affiliation":[]},{"given":"Iurii","family":"Tipikin","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Minin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"key":"37_CR1","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-37282-7_4","volume-title":"Policies and Research in Identity Management","author":"J Camenisch","year":"2013","unstructured":"Camenisch, J., Dubovitskaya, M., Lehmann, A., Neven, G., Paquin, C., Preiss, F.-S.: Concepts and languages for privacy-preserving attribute-based authentication. In: Fischer-H\u00fcbner, S., de Leeuw, E., Mitchell, C. (eds.) IDMAN 2013. IAICT, vol. 396, pp. 34\u201352. Springer, Heidelberg (2013). \n                      https:\/\/doi.org\/10.1007\/978-3-642-37282-7_4"},{"key":"37_CR2","unstructured":"https:\/\/w3c-ccg.github.io\/did-spec\/"},{"key":"37_CR3","unstructured":"https:\/\/www.ethereum.org\/"},{"key":"37_CR4","unstructured":"https:\/\/bitcoin.org\/en\/"},{"key":"37_CR5","unstructured":"https:\/\/www.iota.org\/"},{"key":"37_CR6","unstructured":"https:\/\/www.hyperledger.org\/projects\/hyperledger-indy"},{"key":"37_CR7","unstructured":"Security Team, Computer Science Dept., IBM Research, Specification of the Identity Mixer Cryptographic Library, p. 49 (2010)"},{"key":"37_CR8","unstructured":"https:\/\/www.microsoft.com\/en-us\/research\/project\/u-prove\/"},{"key":"37_CR9","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-319-41354-9_5","volume-title":"Trust Management X","author":"F Veseli","year":"2016","unstructured":"Veseli, F., Serna, J.: Evaluation of privacy-ABC technologies - a study on the computational efficiency. In: Habib, S.M.M., Vassileva, J., Mauw, S., M\u00fchlh\u00e4user, M. (eds.) IFIPTM 2016. IAICT, vol. 473, pp. 63\u201378. Springer, Cham (2016). \n                      https:\/\/doi.org\/10.1007\/978-3-319-41354-9_5"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Sanchez, J.L.C., Bernabe, J.B., Skarmeta, A.F.: Integration of Anonymous Credential Systems in IoT Constrained Environments, p. 11 (2018)","DOI":"10.1109\/ACCESS.2017.2788464"},{"key":"37_CR11","unstructured":"Wagner, K., N\u00e9methi, B., Renieris, E., Lang, P., Brunet, E., Holst, E.: Self-sovereign Identity. A position paper on blockchain enabled identity and the road ahead, p. 57 (2018)"},{"key":"37_CR12","unstructured":"https:\/\/github.com\/WebOfTrustInfo\/rwot4-paris\/blob\/master\/topics-and-advance-readings\/dkms-decentralized-key-mgmt-system.md"},{"key":"37_CR13","unstructured":"SovrinTM: A Protocol and Token for Self-Sovereign Identity and Decentralized Trust, A White Paper from the Sovrin Foundation, p. 42 (2018). \n                      https:\/\/sovrin.org\/wp-content\/uploads\/2018\/03\/Sovrin-Protocol-and-Token-White-Paper.pdf"},{"key":"37_CR14","unstructured":"The Sovrin Trust Framework Working Group, Sovrin Provisional Trust Framework, p. 30 (2017). \n                      https:\/\/sovrin.org\/wp-content\/uploads\/2018\/03\/Sovrin-Provisional-Trust-Framework-2017-06-28.pdf"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation, p. 24 (2004)","DOI":"10.1145\/1030083.1030103"},{"key":"37_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-45572-3_1","volume-title":"Trust and Trustworthy Computing","author":"J Camenisch","year":"2016","unstructured":"Camenisch, J., Drijvers, M., Lehmann, A.: Anonymous attestation using the strong Diffie Hellman assumption revisited. In: Franz, M., Papadimitratos, P. (eds.) Trust 2016. LNCS, vol. 9824, pp. 1\u201320. Springer, Cham (2016). \n                      https:\/\/doi.org\/10.1007\/978-3-319-45572-3_1"},{"key":"37_CR17","unstructured":"J\n                      https:\/\/ssimeetup.org\/"},{"key":"37_CR18","doi-asserted-by":"crossref","unstructured":"Garman, C., Green, M., Miers I.: Decentralized Anonymous Credentials, p. 21 (2013)","DOI":"10.14722\/ndss.2014.23253"},{"key":"37_CR19","unstructured":"Fei, C., Lohkamp, J., Rusu, E., Szawan, K., Wagner, K., Wittenberg, N.: Self-Sovereign and Decentralised Identity By Design, Jolocom Technical White Paper, p. 10 (2018)"},{"key":"37_CR20","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/978-3-319-14439-9","volume-title":"Attribute-Based Credentials for Trust","author":"K Rannenberg","year":"2015","unstructured":"Rannenberg, K., Camenisch, J., Sabouri, A.: Attribute-Based Credentials for Trust, p. 395. Springer, Cham (2015). \n                      https:\/\/doi.org\/10.1007\/978-3-319-14439-9"},{"key":"37_CR21","unstructured":"Neven, G.: A Quick Introduction to Anonymous Credentials, p. 4 (2008)"},{"key":"37_CR22","unstructured":"https:\/\/www.uport.me"},{"key":"37_CR23","unstructured":"https:\/\/www.civic.com\/"},{"key":"37_CR24","unstructured":"https:\/\/jolocom.io\/"},{"key":"37_CR25","unstructured":"https:\/\/veres.one"},{"key":"37_CR26","unstructured":"https:\/\/ont.io"},{"key":"37_CR27","unstructured":"https:\/\/remme.io\/"},{"key":"37_CR28","unstructured":"https:\/\/identity.foundation\/"},{"key":"37_CR29","unstructured":"https:\/\/w3c-ccg.github.io\/did-method-registry\/"},{"key":"37_CR30","unstructured":"https:\/\/uniresolver.io\/"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24296-1_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T21:37:07Z","timestamp":1561757827000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24296-1_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242954","9783030242961"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24296-1_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}