{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T23:40:57Z","timestamp":1773272457495,"version":"3.50.1"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001729","name":"Swedish Foundation for Strategic Research (SSF) Secure and Private Connectivity in Smart Environments (SURPRISE) Project","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001729","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3023659","type":"journal-article","created":{"date-parts":[[2020,9,11]],"date-time":"2020-09-11T20:52:00Z","timestamp":1599857520000},"page":"168470-168485","source":"Crossref","is-referenced-by-count":24,"title":["Privacy-Preserving Identifiers for IoT: A Systematic Literature Review"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7863-2281","authenticated-orcid":false,"given":"Mahdi","family":"Akil","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5717-8649","authenticated-orcid":false,"given":"Lejla","family":"Islami","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6938-4466","authenticated-orcid":false,"given":"Simone","family":"Fischer-Hubner","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9980-3473","authenticated-orcid":false,"given":"Leonardo A.","family":"Martucci","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4496-7611","authenticated-orcid":false,"given":"Albin","family":"Zuccato","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"145","article-title":"A technical overview of digital credentials","volume":"20","author":"brands","year":"2002","journal-title":"Available online"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/586111.586114"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2898900"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-00786-4"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00104"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2018.8355229"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.020211.00045"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.03.007"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-6773.2006.00684.x"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/9126376"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2764095"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0848-x"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2788464"},{"key":"ref2","article-title":"A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management","author":"pfitzmann","year":"2010"},{"key":"ref1","first-page":"1","article-title":"Regulation (EU) 2016\/679 of the European parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/EC (General Data Protection Regulation)","volume":"l119","year":"2016","journal-title":"Off J Eur Union"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2903150.2911710"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2981547"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721742"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3054977.3054994"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6384186"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2015.7145918"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2775248"},{"key":"ref50","volume":"9","author":"weber","year":"2012","journal-title":"Multilaterally Secure Pervasive Cooperation Privacy Protection Accountability and Secure Communication for the Age of Pervasive Computing"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4351603"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00263"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2344013"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1032761"},{"key":"ref10","first-page":"13","article-title":"Analyzing the past to prepare for the future: Writing a literature review","volume":"26","author":"webster","year":"2002","journal-title":"MIS Quart"},{"key":"ref40","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Proc Workshop Theory Appl Cryptograph Techn"},{"key":"ref11","author":"rumsey","year":"2008","journal-title":"How to Find Information A Guide for Researchers"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2009.23"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.93"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.007"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2263793"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2015.31"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389154"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/Kaleidoscope.2015.7383648"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2402166"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/BF02351717"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180431"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352558"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-01-2019-0016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79966-5_5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.07.010"},{"key":"ref46","first-page":"1","article-title":"H2. 1&#x2014;ABC4trust architecture for developers","volume":"2","author":"camenisch","year":"2012","journal-title":"Heartbeat"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27809-2_21"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref41","first-page":"339","article-title":"Proactive secret sharing or: How to cope with perpetual leakage","author":"herzberg","year":"1995","journal-title":"Proc Annu Int Cryptol Conf"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0052"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055482"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09194705.pdf?arnumber=9194705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:53Z","timestamp":1639770953000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9194705\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3023659","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}