{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T21:16:22Z","timestamp":1725657382796},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,6]]},"DOI":"10.1109\/isdfs55398.2022.9800823","type":"proceedings-article","created":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T19:52:11Z","timestamp":1655927531000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["An Improved Anonymous Identifier"],"prefix":"10.1109","author":[{"given":"Ray","family":"Kresman","sequence":"first","affiliation":[{"name":"Bowling Green State University,Department of Computer Science,Bowling Green,OH,43403"}]},{"given":"Larry","family":"Dunning","sequence":"additional","affiliation":[{"name":"Bowling Green State University,Department of Computer Science,Bowling Green,OH,43403"}]},{"given":"Jinglei","family":"Lu","sequence":"additional","affiliation":[{"name":"Bowling Green State University,Department of Computer Science,Bowling Green,OH,43403"}]}],"member":"263","reference":[{"key":"ref10","first-page":"126","article-title":"Defining privacy for data mining","author":"clifton","year":"2002","journal-title":"National Science Foundation Workshop on Next Generation Data Mining"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2235831"},{"article-title":"RngStreams - multiple independent streams of pseudo-random numbers","year":"2009","author":"l'ecuyer","key":"ref12"},{"article-title":"Python Blowfish","year":"0","author":"voras","key":"ref13"},{"journal-title":"Self-Sovereign Identity Decentralized Digital Identity and Verifiable Credentials","year":"2021","author":"preukschat","key":"ref4"},{"key":"ref3","article-title":"Apple just crippled IDFA, sending an $80 billion industry into upheaval","author":"koetsier","year":"2020","journal-title":"Forbes Magazine"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872771"},{"article-title":"Difference between Web 2.0 and Web 3.0","year":"2021","author":"geroni","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974131"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.3.1.9-17"},{"article-title":"3 Undeniable Reasons Why you need online anonymity","year":"2013","author":"torbet","key":"ref2"},{"article-title":"Anonymous and authenticated: digital Identity on the open internet","year":"2020","author":"ciobotaru","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_3"}],"event":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","start":{"date-parts":[[2022,6,6]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2022,6,7]]}},"container-title":["2022 10th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9800750\/9800752\/09800823.pdf?arnumber=9800823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T17:57:49Z","timestamp":1686592669000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9800823\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/isdfs55398.2022.9800823","relation":{},"subject":[],"published":{"date-parts":[[2022,6,6]]}}}