{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T05:20:30Z","timestamp":1741152030052,"version":"3.38.0"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/ants63515.2024.10898962","type":"proceedings-article","created":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T18:28:09Z","timestamp":1741026489000},"page":"1-3","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Preservation with Decentralized Authentication in Multi-Agent Systems"],"prefix":"10.1109","author":[{"given":"Puspanjali","family":"Ghoshal","sequence":"first","affiliation":[{"name":"Indian Institute of Technology,Guwahati,Assam,India"}]},{"given":"Charan","family":"Annadurai","sequence":"additional","affiliation":[{"name":"Offenburg University,Offenburg,Germany"}]},{"given":"Axel","family":"Sikora","sequence":"additional","affiliation":[{"name":"Offenburg University,Offenburg,Germany"}]},{"given":"Ashok Singh","family":"Sairam","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology,Guwahati,Assam,India"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/access.2018.2831228"},{"issue":"29","key":"ref2","article-title":"A Survey of Privacy in Multi-agent Systems","author":"Jose","year":"2013","journal-title":"The Knowledge Engineering Review"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/globalsip.2018.8646390"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.3233\/wia-2010-0188"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/infocom.2014.6848002"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1561\/9781601988195"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/access.2021.3117588"},{"year":"2022","journal-title":"W3C","article-title":"Decentralized Identifiers (DIDs) v1.0","key":"ref8"},{"year":"2024","journal-title":"W3C","article-title":"Verifiable Credentials Data Model v2.0","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/icufn55119.2022.9829562"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.3390\/diagnostics12020241"}],"event":{"name":"2024 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","start":{"date-parts":[[2024,12,15]]},"location":"Guwahati, India","end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10898162\/10897786\/10898962.pdf?arnumber=10898962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T06:10:27Z","timestamp":1741068627000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10898962\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/ants63515.2024.10898962","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}