{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T19:29:55Z","timestamp":1772479795928,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/icbc48266.2020.9169411","type":"proceedings-article","created":{"date-parts":[[2020,8,17]],"date-time":"2020-08-17T18:39:45Z","timestamp":1597689585000},"page":"1-9","source":"Crossref","is-referenced-by-count":44,"title":["Decentralized Identity and Trust Management Framework for Internet of Things"],"prefix":"10.1109","author":[{"given":"Markus","family":"Luecking","sequence":"first","affiliation":[]},{"given":"Christian","family":"Fries","sequence":"additional","affiliation":[]},{"given":"Robin","family":"Lamberti","sequence":"additional","affiliation":[]},{"given":"Wilhelm","family":"Stork","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00190"},{"key":"ref30","article-title":"Tangle ID","year":"2019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/s18124215"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00250"},{"key":"ref12","first-page":"173","article-title":"Towards an Optimized BlockChain for IoT","author":"ali dorri","year":"2017","journal-title":"2017 IEEE\/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)"},{"key":"ref13","volume":"21","author":"brown","year":"2019","journal-title":"UniquID A Quest to Reconcile Identity Access Management and the IoT"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00263"},{"key":"ref15","article-title":"IOTA Unified Identity whitepaper - Our Vision for a Unified Identity Protocol on the Tangle for Things, Organizations, and Individuals","author":"millenaar","year":"2019"},{"key":"ref16","article-title":"Decentralized Identifiers ({DIDs}) v1.0","author":"sabadello","year":"2019","journal-title":"W3C Tech Rep"},{"key":"ref17","first-page":"1","article-title":"Blockchain based trust & authentication for decentralized sensor networks","author":"moinet","year":"2017"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3055518.3055530"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.06.025"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s18103577"},{"key":"ref27","first-page":"1","article-title":"IOTA whitepaper v1.4.3","volume":"81","author":"popov","year":"2018","journal-title":"New Yorker"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803174"},{"key":"ref6","first-page":"559","article-title":"Digital Trust Protocol","volume":"555","author":"keutmann","year":"2018","journal-title":"Nature"},{"key":"ref29","article-title":"Introducing Masked Authenticated Messaging","author":"handy","year":"2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2863180"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.043221010"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAC.2017.14"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1147\/sj.384.0693"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3322431.3326327"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IMPACT.2015.7365193"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.848"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2015.67"},{"key":"ref21","volume":"1058","author":"li","year":"2019","journal-title":"Internet Web Trust System Based on Smart Contract"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00230"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8706760"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2914675"},{"key":"ref25","first-page":"1","article-title":"The Identity Crisis. Security, Privacy and Usability Issues in Identity Management","author":"alp\u00e1r","year":"2011"}],"event":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","location":"Toronto, ON, Canada","start":{"date-parts":[[2020,5,2]]},"end":{"date-parts":[[2020,5,6]]}},"container-title":["2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9165689\/9169389\/09169411.pdf?arnumber=9169411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T20:24:22Z","timestamp":1656361462000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9169411\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icbc48266.2020.9169411","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}