{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T10:30:50Z","timestamp":1774866650593,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642540684","type":"print"},{"value":"9783642540691","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54069-1_9","type":"book-chapter","created":{"date-parts":[[2014,1,15]],"date-time":"2014-01-15T08:09:15Z","timestamp":1389773355000},"page":"140-156","source":"Crossref","is-referenced-by-count":7,"title":["Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based Credentials"],"prefix":"10.1007","author":[{"given":"Vasiliki","family":"Liagkou","sequence":"first","affiliation":[]},{"given":"George","family":"Metakides","sequence":"additional","affiliation":[]},{"given":"Apostolis","family":"Pyrgelis","sequence":"additional","affiliation":[]},{"given":"Christoforos","family":"Raptopoulos","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Spirakis","sequence":"additional","affiliation":[]},{"given":"Yannis C.","family":"Stamatiou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Project Description, ABC4Trust-Attribute-based Credentials for Trust, \n                    \n                      https:\/\/abc4trust.eu\/"},{"key":"9_CR2","unstructured":"European Network and Information Security Agency, Privacy Features of European eID Card Specifications. Position Paper (February 2009), \n                    \n                      http:\/\/www.enisa.europa.eu\/act\/it\/privacy-and-trust\/eid\/eid-cards-en"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 93\u2013118. Springer, Heidelberg (2001)"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-28628-8_4","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"J. Camenisch","year":"2004","unstructured":"Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 56\u201372. Springer, Heidelberg (2004)"},{"issue":"10","key":"9_CR5","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. Commun. ACM\u00a028(10), 1030\u20131044 (1985)","journal-title":"Commun. ACM"},{"issue":"12","key":"9_CR6","first-page":"704","volume":"24","author":"H. Federrath","year":"2000","unstructured":"Federrath, H., Pfitzmann, A.: Gliederung und Systematisierung von Schutzzielen in IT-Systemen. Datenschutz und Datensicherheit (DuD)\u00a024(12), 704\u2013710 (2000)","journal-title":"Datenschutz und Datensicherheit (DuD)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Hedbom, H., Schallab\u00f6ck, J., Wenning, R., Hansen, M.: Contributions to standardisation. In: Privacy and Identity Management for Life, pp. 479\u2013492 (2011)","DOI":"10.1007\/978-3-642-20317-6_25"},{"key":"9_CR8","unstructured":"Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management (2010), \n                    \n                      http:\/\/dud.inf.tu-dresden.de\/Anon_Terminology.shtml"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Zwingelberg, H., Hansen, M.: Privacy protection goals and their implications for eID system (2012)","DOI":"10.1007\/978-3-642-31668-5_19"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54069-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T03:04:41Z","timestamp":1558839881000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54069-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642540684","9783642540691"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54069-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}