{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:43:38Z","timestamp":1762004618383,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/iscc.2014.6912541","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T16:27:42Z","timestamp":1412094462000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["User-centric Identity Management based on secure elements"],"prefix":"10.1109","author":[{"given":"Davi","family":"Boger","sequence":"first","affiliation":[]},{"given":"Luciano","family":"Barreto","sequence":"additional","affiliation":[]},{"given":"Joni","family":"Fraga","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Urien","sequence":"additional","affiliation":[]},{"given":"Hassane","family":"Aissaoui","sequence":"additional","affiliation":[]},{"given":"Andre","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Guy","family":"Pujolle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22633-5_11"},{"key":"16","first-page":"75","article-title":"Smart OpenID: A smart card based openID protocol","volume":"376","author":"leicher","year":"2012","journal-title":"IFIP AICT"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199363"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2010.5421756"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2008.38"},{"journal-title":"Integrating OpenID and Infocard-Part 1\"","year":"2007","author":"cameron","key":"12"},{"key":"3","doi-asserted-by":"crossref","first-page":"493","DOI":"10.3233\/JCS-2007-15502","article-title":"User centricity: A taxonomy and open issues","volume":"15","author":"bhargav-spantzel","year":"2007","journal-title":"Journal of Computer Security"},{"journal-title":"Cryptographic Token Interface Standard","year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2013.30"},{"year":"0","key":"1"},{"journal-title":"Openid Authentication 2 0 OPENID","year":"2007","key":"7"},{"key":"6","first-page":"99","article-title":"Trust requirements in identity management","volume":"44","author":"j\ufffdsang","year":"2005","journal-title":"CRPIT"},{"key":"5","article-title":"User centric identity management","author":"j\ufffdsang","year":"2005","journal-title":"AusCERT 2005"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"journal-title":"Higgins Open Source Identity Framework","year":"2010","key":"9"},{"journal-title":"Introducing Windows CardSpace","year":"2006","author":"chappell","key":"8"}],"event":{"name":"2014 IEEE Symposium on Computers and Communication (ISCC)","start":{"date-parts":[[2014,6,23]]},"location":"Funchal, Madeira, Portugal","end":{"date-parts":[[2014,6,26]]}},"container-title":["2014 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6892194\/6912451\/06912541.pdf?arnumber=6912541","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T13:23:21Z","timestamp":1565875401000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6912541\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iscc.2014.6912541","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}