{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T00:17:16Z","timestamp":1772151436148,"version":"3.50.1"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Ministry of Science and Information and Communication Technology (ICT) (MSIT), South Korea, under the High-Potential Individuals Global Training Program"},{"DOI":"10.13039\/501100010418","name":"Institute for Information and Communications Technology Planning and Evaluation","doi-asserted-by":"publisher","award":["2020-0-01596"],"award-info":[{"award-number":["2020-0-01596"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fostering Outstanding Universities for Research","award":["5199990914048"],"award-info":[{"award-number":["5199990914048"]}]},{"DOI":"10.13039\/501100002560","name":"Soonchunhyang University Research Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002560","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3080329","type":"journal-article","created":{"date-parts":[[2021,5,14]],"date-time":"2021-05-14T19:37:25Z","timestamp":1621021045000},"page":"75945-75960","source":"Crossref","is-referenced-by-count":23,"title":["VAIM: Verifiable Anonymous Identity Management for Human-Centric Security and Privacy in the Internet of Things"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6171-9674","authenticated-orcid":false,"given":"Gyeongjin","family":"Ra","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2041-5425","authenticated-orcid":false,"given":"Taehoon","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8856-0103","authenticated-orcid":false,"given":"Imyeong","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"268","article-title":"A signature scheme with efficient protocols","author":"camenisch","year":"2002","journal-title":"Proc Int Conf Secur Commun Netw"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPCON.2019.00025"},{"key":"ref30","article-title":"Efficient zero-knowledge range proofs in ethereum","author":"koens","year":"2018"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2841972"},{"key":"ref35","author":"jiwon lee","year":"2019","journal-title":"Saver Snark-friendly additively-homomorphic and verifiable encryption and decryption with rerandomization"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101636"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1800116"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2950872"},{"key":"ref12","article-title":"Towards self-sovereign identity using blockchain technology","author":"baars","year":"2016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3111247"},{"key":"ref14","article-title":"Blockchain and digital signatures for digital self-sovereignty","author":"patel","year":"2018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s18124215"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315280"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/BRAINS49436.2020.9223292"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00077"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31500-9_22"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.7841465"},{"key":"ref27","author":"hopwood","year":"2016","journal-title":"Zcash Protocol Specification"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2015.24"},{"key":"ref6","first-page":"393","article-title":"Beyond the hype: Internet of Things concepts, security and privacy concerns","author":"tyagi","year":"2019","journal-title":"Proc Int Conf Emerg Trends Eng"},{"key":"ref29","article-title":"Zendoo: A zk-SNARK verifiable cross-chain transfer protocol enabling decoupled and decentralized sidechains","author":"garoffolo","year":"2020","journal-title":"arXiv 2002 01847"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.105"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838365"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1201\/9781420052206"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v7i5.pp2474-2482"},{"key":"ref9","article-title":"Identity management framework towards Internet of Things","author":"mahalle","year":"2013"},{"key":"ref1","author":"congress","year":"1991","journal-title":"Andean Strategy&#x2013;Hearing Before the House Select Committee on Narcotics Abuse and Control 102nd Congress"},{"key":"ref20","first-page":"781","article-title":"Succinct non-interactive zero knowledge for a von neumann architecture","author":"ben-sasson","year":"2014","journal-title":"Proc 23rd USENIX Secur Symp (USENIX Secur )"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2910058"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.026"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2788464"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98113-0_2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07396-x"},{"key":"ref25","first-page":"382","article-title":"Modified anonymous attestation protocol of the TPM-installed device for the mobile environment","author":"shin","year":"2009","journal-title":"Proc CISC-W"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09430948.pdf?arnumber=9430948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:56:08Z","timestamp":1639770968000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9430948\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3080329","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}