{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:10:18Z","timestamp":1756271418648,"version":"3.44.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130029","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"1057-1062","source":"Crossref","is-referenced-by-count":0,"title":["DISTIL: Digital Identities for the Evaluation of Job Skills"],"prefix":"10.1109","author":[{"given":"Dimitrios","family":"Kasimatis","sequence":"first","affiliation":[{"name":"Edinburgh Napier University,Blockpass ID Lab,Edinburgh,UK,EH10 5DT"}]},{"given":"Pavlos","family":"Papadopoulos","sequence":"additional","affiliation":[{"name":"Edinburgh Napier University,Blockpass ID Lab,Edinburgh,UK,EH10 5DT"}]},{"given":"William J.","family":"Buchanan","sequence":"additional","affiliation":[{"name":"Edinburgh Napier University,Blockpass ID Lab,Edinburgh,UK,EH10 5DT"}]},{"given":"Christos","family":"Chrysoulas","sequence":"additional","affiliation":[{"name":"Heriot-Watt University,School of Mathematical and Computer Sciences,Edinburgh,UK"}]},{"given":"Sarwar","family":"Sayeed","sequence":"additional","affiliation":[{"name":"Edinburgh Napier University,Blockpass ID Lab,Edinburgh,UK,EH10 5DT"}]},{"given":"Alexios","family":"Mylonas","sequence":"additional","affiliation":[{"name":"University of Hertfordshire,Department of Computer Science,Hertfordshire,UK"}]},{"given":"Nikolaos","family":"Pitropakis","sequence":"additional","affiliation":[{"name":"The American College of Greece,Department of Information Technology,Athens,Greece"}]}],"member":"263","reference":[{"journal-title":"EU-Commission","article-title":"European digital identity","year":"2025","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2021.103486"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/1359432X.2019.1681401"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1108\/JICES-04-2021-0042"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-021-00122-5"},{"key":"ref6","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008","journal-title":"Decentralized business review"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-61014-1_8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12276"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-019-0989-z"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-020-09526-2"},{"issue":"2","key":"ref11","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1111\/ntwe.12140","article-title":"Online privacy in job recruitment processes? boundary work among cybervetting recruiters","volume":"34","author":"Backman","year":"2019","journal-title":"New Technology, Work and Employment"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2018.2888782"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-021-00722-y"},{"issue":"2016","key":"ref14","first-page":"18","article-title":"The inevitable rise of self-sovereign identity","volume":"29","author":"Tobin","year":"2016","journal-title":"The Sovrin Foundation"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2020.00026"},{"key":"ref16","article-title":"Self-sovereign identity solutions: The necessity of blockchain technology","author":"Van Bokkem","year":"2019","journal-title":"arXiv preprint arXiv:1904.12816"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931173"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149366"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28419"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968985"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2019.101442"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/OBD.2016.11"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/1112"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-5802-9_24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-7240-1_7"},{"key":"ref26","article-title":"Self-sovereign identity - opportunities and challenges for the digital revolution","author":"Der","year":"2017","journal-title":"arXiv preprint arXiv:1712.01767"},{"key":"ref27","first-page":"2016","article-title":"Regulation (eu) 2016\/679 of the european parliament and of the council","volume":"679","author":"Regulation","year":"2016","journal-title":"Regulation (eu)"},{"journal-title":"Hyperledger","article-title":"Hyperledger indy","year":"2025","key":"ref28"},{"journal-title":"Hyperledger","article-title":"Hyperledger aries","year":"2025","key":"ref29"},{"issue":"3","key":"ref30","first-page":"228","article-title":"An introduction to docker and analysis of its performance","volume":"17","author":"Rad","year":"2017","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"journal-title":"VON","article-title":"Von network","year":"2025","key":"ref31"},{"journal-title":"Hyperledger","article-title":"Hyperledger anoncreds","year":"2025","key":"ref32"},{"key":"ref33","article-title":"Verifiable credentials flavors explained","author":"Young","year":"2021","journal-title":"Linux Foundation Public Health"},{"journal-title":"aca py.org","article-title":"Aries cloud agent - python","year":"2025","key":"ref34"},{"journal-title":"Hyperledger","article-title":"Aries rfc 0036: Issue credential protocol 1.0","year":"2025","key":"ref35"},{"year":"2025","key":"ref36","article-title":"Aries rfc 0160: Connection protocol"},{"year":"2025","key":"ref37","article-title":"Aries rfc 0037: Present proof protocol 1.0"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2829141"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3280"},{"journal-title":"Cryptology ePrint Archive","article-title":"An accumulator based on bilinear maps and efficient revocation for anonymous credentials","author":"Camenisch","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.5220\/0010337806610669"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904181"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3284764.3284767"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.isprsjprs.2015.11.006"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130029.pdf?arnumber=11130029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T04:52:43Z","timestamp":1756270363000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130029\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130029","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}