{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:49:24Z","timestamp":1730195364346,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/afrcon.2017.8095596","type":"proceedings-article","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T11:04:21Z","timestamp":1511867061000},"page":"867-872","source":"Crossref","is-referenced-by-count":2,"title":["Privacy enhancing national identification card system"],"prefix":"10.1109","author":[{"given":"Eric","family":"Kuada","sequence":"first","affiliation":[]},{"given":"Isaac","family":"Wiafe","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Addo","sequence":"additional","affiliation":[]},{"given":"Emmanuel","family":"Djaba","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"SearchSecurity","article-title":"What is identity theft? -Definition from WhatIs.com","year":"0","key":"ref10"},{"key":"ref11","first-page":"62","article-title":"UAE National ID Programme Case Study","volume":"1","author":"al-khouri","year":"2007","journal-title":"International Journal of Social Science"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1610252.1610283"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2011.3306"},{"key":"ref14","article-title":"The Privacy and Security of An Identification Card: Malaysia Perspective","author":"mohd shukri","year":"2015","journal-title":"Munich Personal RePEc Archive"},{"key":"ref15","article-title":"Privacy and Biometric ID Systems: An Approach Using Fair Information CGD Policy Paper 028 August 2013","author":"gellman","year":"2013","journal-title":"Cent Glob Dev"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.18608\/jla.2014.11.8"},{"key":"ref17","first-page":"139","article-title":"Public Attitudes towards a National Indentity &#x2018;Smart Card:&#x2019; Privacy and Security Concerns","volume":"5","author":"hiltz","year":"2003","journal-title":"Proc 36th Hawaii Int Conf Syst Sci"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/501317.501357"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1177\/0165551506064902"},{"journal-title":"Ethics for the Information Age","year":"2014","author":"quinn","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.59"},{"journal-title":"Privacy Features of European eID Card Specifications - ENISA","year":"2009","author":"naumann","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2008.08.002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(08)70097-7"},{"journal-title":"Electronic Frontier Foundation","article-title":"Mandatory National IDs and Biometric Databases","year":"2016","key":"ref2"},{"key":"ref1","article-title":"EPIC - National ID and the REAL ID Act","author":"electronic","year":"2015","journal-title":"Electronic Privacy Information Center"},{"journal-title":"Anonymity Unobservability Pseudonymity and Identity Management A Proposal for Terminology","year":"0","author":"pfitzman","key":"ref9"},{"key":"ref20","first-page":"1","author":"elder","year":"2015","journal-title":"Title An Empirical Investigation of Privacy The Impact of Multiple Levels of Trust"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9973.2006.00474.x"}],"event":{"name":"2017 IEEE AFRICON","start":{"date-parts":[[2017,9,18]]},"location":"Cape Town","end":{"date-parts":[[2017,9,20]]}},"container-title":["2017 IEEE AFRICON"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8085624\/8095433\/08095596.pdf?arnumber=8095596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T18:30:45Z","timestamp":1512671445000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8095596\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/afrcon.2017.8095596","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}