{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T14:30:27Z","timestamp":1768314627654,"version":"3.49.0"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,25]]},"DOI":"10.1109\/candarw68385.2025.00058","type":"proceedings-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T18:20:34Z","timestamp":1768242034000},"page":"308-313","source":"Crossref","is-referenced-by-count":0,"title":["Proposal of an Identity Verification System Using Trusted Execution Environment in the Japan\u2019s Digital Authentication App"],"prefix":"10.1109","author":[{"given":"Tomoki","family":"Yasui","sequence":"first","affiliation":[{"name":"Hiroshima University,Graduate School of Advanced Science and Engineering,Hiroshima,Japan"}]},{"given":"Hidenobu","family":"Watanabe","sequence":"additional","affiliation":[{"name":"Hiroshima University,Information Media Center,Hiroshima,Japan"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Digital Authentication App","year":"2025"},{"key":"ref2","article-title":"Digital Authentication App","year":"2025"},{"key":"ref3","first-page":"1","article-title":"Considering the use of TEE for authentication and authorization of digital authentication app service APIs","volume-title":"*Internet and Operations Technology Technical Report (IOT)","author":"Yasui","year":"2025"},{"key":"ref4","article-title":"Intel Software Guard Extensions (SGX): Confidential Computing for Data-in-Use","volume-title":"Intel Developer Documentation."},{"key":"ref5","article-title":"AWS Nitro Enclaves","year":"2025","journal-title":"*Amazon EC2 Documentation*"},{"issue":"3","key":"ref6","first-page":"1","article-title":"Keyspector: Secure Execution of Intrusion Detection Systems for IoT Devices Using Keystone","volume-title":"IPSJ SIG Technical Report","volume":"2025-OS-167","author":"Iwano","year":"2025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.23919\/ISITA60732.2024.10858277"},{"issue":"1","key":"ref8","first-page":"1","article-title":"A study of identity verification methods for digital student ID","volume-title":"IPSJ SIG Tech. Rep. (IOT)","volume":"2024-IOT-66","author":"Itokawa","year":"2024"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93524-9_5"},{"key":"ref10","first-page":"1","article-title":"Implementation and evaluation on security modules for the edge computing platform based on modular architecture","volume-title":"IPSJ SIG Tech. Rep. (IOT)","volume":"2018-IOT-040","author":"Yanagi","year":"2018"}],"event":{"name":"2025 Thirteenth International Symposium on Computing and Networking Workshops (CANDARW)","location":"Yamagata, Japan","start":{"date-parts":[[2025,11,25]]},"end":{"date-parts":[[2025,11,28]]}},"container-title":["2025 Thirteenth International Symposium on Computing and Networking Workshops (CANDARW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11318850\/11318884\/11318915.pdf?arnumber=11318915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:50:02Z","timestamp":1768294202000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11318915\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,25]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/candarw68385.2025.00058","relation":{},"subject":[],"published":{"date-parts":[[2025,11,25]]}}}