{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T20:24:15Z","timestamp":1760300655694,"version":"3.37.3"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100011665","name":"Deanship of Scientific Research, King Saud University for funding through Vice Deanship of Scientific Research Chairs","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011665","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002383","name":"Deanship of Scientific Research and RSSU at King Saud University for their technical support","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3110762","type":"journal-article","created":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T19:31:01Z","timestamp":1631043061000},"page":"125065-125079","source":"Crossref","is-referenced-by-count":15,"title":["Privacy Preservation of User Identity in Contact Tracing for COVID-19-Like Pandemics Using Edge Computing"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7301-4962","authenticated-orcid":false,"given":"Mohammed Abdullah","family":"Alsahli","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1702-8643","authenticated-orcid":false,"given":"Ahmed","family":"Alsanad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3479-3606","authenticated-orcid":false,"given":"Mohammad Mehedi","family":"Hassan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8512-9687","authenticated-orcid":false,"given":"Abdu","family":"Gumaei","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3050241"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3074753"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3037108"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958355"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsx.2020.08.029"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/hbe2.237"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3071508"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3052901"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3053409"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3078549"},{"key":"ref60","first-page":"1","article-title":"Schistoscope: Smartphone versus raspberry Pi based low-cost diagnostic device for urinary schistosomiasis","author":"diehl","year":"2020","journal-title":"Proc IEEE Global Humanitarian Technol Conf (GHTC)"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"journal-title":"Exposure Notification BLE Simulator","year":"2021","author":"huebler","key":"ref61"},{"journal-title":"Hyperledger sawtooth","year":"2021","key":"ref63"},{"key":"ref28","article-title":"Mining user reviews of COVID contact-tracing apps: An exploratory analysis of nine European apps","author":"garousi","year":"2020","journal-title":"arXiv 2012 13589"},{"key":"ref64","first-page":"1310","article-title":"Light weight passive human motion detection with WiFi","author":"wang","year":"2021","journal-title":"Proc 6th Int Conf Intell Comput Signal Process (ICSP)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2147\/PPA.S276183"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102287"},{"key":"ref2","article-title":"Quarantine alone or in combination with other public health measures to control COVID-19: A rapid review","author":"nussbaumer-streit","year":"2020","journal-title":"Cochrane Database Syst Rev"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1093\/jtm\/taaa020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968621"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700120"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3003575"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3053233"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3036399"},{"key":"ref26","article-title":"Privacy-preserving contact tracing: Current solutions and open questions","author":"tang","year":"2020","journal-title":"arXiv 2004 06818"},{"journal-title":"Demographics of Mobile Device Ownership and Adoption in the United States","year":"2021","key":"ref25"},{"journal-title":"Covid Safe Paths","year":"2021","key":"ref50"},{"key":"ref51","article-title":"Epione: Lightweight contact tracing with strong privacy","author":"trieu","year":"2020","journal-title":"arXiv 2004 13293"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.enconman.2015.01.088"},{"journal-title":"Diagnosis Key Analysis","year":"2021","key":"ref58"},{"key":"ref57","doi-asserted-by":"crossref","DOI":"10.1109\/TMC.2020.3025286","article-title":"Monetizing edge service in mobile internet ecosystem","author":"wang","year":"2020","journal-title":"IEEE Trans Mobile Comput"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3025953"},{"key":"ref55","first-page":"1","article-title":"CoviChain: A blockchain based framework for nonrepudiable contact tracing in healthcare cyber-physical systems during pandemic outbreaks","volume":"2","author":"vangipuram","year":"2021","journal-title":"Social Netw Comput Sci"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2020.3026060"},{"key":"ref53","article-title":"DESIRE: A third way for a European exposure notification system leveraging the best of centralized and decentralized systems","author":"castelluccia","year":"2020","journal-title":"arXiv 2008 01621"},{"article-title":"Contra corona: Contact tracing against the coronavirus by bridging the centralized&#x2013;decentralized divide for stronger privacy","year":"2020","author":"beskorovajnov","key":"ref52"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.11.007"},{"journal-title":"Google and Apple Jointly Created the Exposure Notifications System","year":"2020","key":"ref11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3032553"},{"journal-title":"Privacy Preserving Contact Tracing","year":"2020","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103520"},{"key":"ref14","first-page":"399","article-title":"Analysis of DP3T: Between scylla and charybdis","volume":"2020","author":"vaudenay","year":"2020","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3068178"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2976687"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3018124"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5220\/0008914503330340"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000322"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajic.2004.08.007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/nm0503-487"},{"key":"ref6","article-title":"Trust and transparency in contact tracing applications","author":"hobson","year":"2020","journal-title":"arXiv 2006 11356"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/ima.22552"},{"key":"ref8","first-page":"1085","article-title":"An empirical assessment of global COVID-19 contact tracing applications","author":"sun","year":"2021","journal-title":"Proc IEEE\/ACM 43rd Int Conf Softw Eng (ICSE)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010226"},{"key":"ref49","first-page":"1","article-title":"Remote monitoring of patients with COVID-19: Design, implementation, and outcomes of the first 3,000 patients in COVID watch","volume":"1","author":"morgan","year":"2020","journal-title":"NEJM Catalyst Innovations in Care Delivery"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3063152"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.18421\/TEM101-09"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00520-z"},{"key":"ref48","first-page":"1","article-title":"COVIDSafe, Australia&#x2019;s digital contact tracing app: The legal issues","volume":"12","author":"david","year":"2020","journal-title":"SSRN Electron J"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1215\/18752160-8698301"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3011201"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3043350"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3005541"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022429"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09530540.pdf?arnumber=9530540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T01:53:55Z","timestamp":1643248435000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9530540\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":64,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3110762","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}