{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T12:50:42Z","timestamp":1777726242226,"version":"3.51.4"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T00:00:00Z","timestamp":1694995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T00:00:00Z","timestamp":1694995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100011688","name":"ECSEL Joint Undertaking","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011688","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,18]]},"DOI":"10.1109\/fmec59375.2023.10305878","type":"proceedings-article","created":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T18:51:37Z","timestamp":1699469497000},"page":"276-283","source":"Crossref","is-referenced-by-count":2,"title":["Zero- Touch Privacy Preserving Provisioning in an Edge-, Fog-, and Cloud Environment"],"prefix":"10.1109","author":[{"given":"Raphael","family":"Schermann","sequence":"first","affiliation":[{"name":"Institute of Technical Informatics, Graz University of Technology,Graz,Austria"}]},{"given":"Simone","family":"Bussa","sequence":"additional","affiliation":[{"name":"Politecnico di Torino,Department of Control and Computer Engineering,Turin,Italy"}]},{"given":"Rainer","family":"Urian","sequence":"additional","affiliation":[{"name":"Infineon Technologies AG,Augsburg,Germany"}]},{"given":"Christian","family":"Steger","sequence":"additional","affiliation":[{"name":"Institute of Technical Informatics, Graz University of Technology,Graz,Austria"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.118"},{"key":"ref12","author":"chandler","year":"2017","journal-title":"Intel Enhanced Privacy ID (EPID) Security Technology"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/11832072_8","article-title":"Constant-size dynamic k-TAA","author":"au","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"key":"ref11","article-title":"A Cost-Effective Foun-dation for End-to-End IoT Security","year":"2016","journal-title":"Intel Coperation"},{"key":"ref10","article-title":"Cisco Fog Computing Solutions: Un-leash the Power of the Internet of Things","year":"2015","journal-title":"Cisco"},{"key":"ref2","author":"cooper","year":"2020","journal-title":"FIDO Device Onboard Specifi-cation"},{"key":"ref1","article-title":"IoT Growth Demands Rethink of Long- Term Storage Strategies, says IDC","year":"2020","journal-title":"International Data Corporation"},{"key":"ref17","author":"blanchet","year":"2011","journal-title":"ProVerif 1 85 Automatic Cryptographic Protocol Verifier User Manual and Tutorial"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/978-3-540-28628-8_4","article-title":"Signature schemes and anonymous credentials from bilinear maps","author":"camenisch","year":"2004","journal-title":"Advances in Cryptology - CRYPTO 2004"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom56396.2022.00093"},{"key":"ref7","author":"cooper","year":"2021","journal-title":"FIDO Device Onboard Specification 1 1"},{"key":"ref9","author":"antonopoulos","year":"2012","journal-title":"Cloud Computing - Principles Systems and Applications"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8572"},{"key":"ref3","year":"0","journal-title":"Intel Zero-touch provisioning for edge devicesand software-defined networks"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103362"},{"key":"ref5","first-page":"111 095","volume":"9","author":"maksuti","year":"0","journal-title":"Automated and secure onboarding for system of systems"}],"event":{"name":"2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC)","location":"Tartu, Estonia","start":{"date-parts":[[2023,9,18]]},"end":{"date-parts":[[2023,9,20]]}},"container-title":["2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10305711\/10305726\/10305878.pdf?arnumber=10305878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T19:22:41Z","timestamp":1702322561000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10305878\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,18]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/fmec59375.2023.10305878","relation":{},"subject":[],"published":{"date-parts":[[2023,9,18]]}}}