{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:17:49Z","timestamp":1740133069349,"version":"3.37.3"},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Comput."],"published-print":{"date-parts":[[2023,3,1]]},"DOI":"10.1109\/mic.2022.3213870","type":"journal-article","created":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T23:09:45Z","timestamp":1667516985000},"page":"13-19","source":"Crossref","is-referenced-by-count":1,"title":["Privacy and Integrity Threats in Contact Tracing Systems and Their Mitigations"],"prefix":"10.1109","volume":"27","author":[{"given":"Gennaro","family":"Avitabile","sequence":"first","affiliation":[{"name":"University of Salerno, Fisciano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0557-9969","authenticated-orcid":false,"given":"Vincenzo","family":"Botta","sequence":"additional","affiliation":[{"name":"University of Salerno, Fisciano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5006-0816","authenticated-orcid":false,"given":"Vincenzo","family":"Iovino","sequence":"additional","affiliation":[{"name":"Aragon Association, Zug, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2381-5846","authenticated-orcid":false,"given":"Ivan","family":"Visconti","sequence":"additional","affiliation":[{"name":"University of Salerno, Fisciano, Italy"}]}],"member":"263","reference":[{"year":"2020","author":"Tang","article-title":"Privacy-Preserving Contact Tracing: Current solutions and open questions","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/978-3-030-65277-7_1"},{"key":"ref3","article-title":"Analysis of DP3T","volume-title":"IACR Cryptol. EPrint Archive, Paper 2020\/399","author":"Vaudenay","year":"2020"},{"key":"ref4","article-title":"Centralized or decentralized? the contact tracing dilemma","volume-title":"IACR Cryptol. EPrint Archive, Paper 2020\/531","author":"Vaudenay","year":"2020"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/978-3-030-78372-3_9"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/978-3-030-75539-3_18"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/978-3-030-75539-3_17"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/3480467"},{"key":"ref9","article-title":"Privacy-preserving automated exposure notification","volume-title":"IACR Cryptol. ePrint Archive, Paper 2020\/863","author":"Canetti","year":"2020"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.14722\/coronadef.2021.23013"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-030-64840-4_29"},{"issue":"2","key":"ref12","first-page":"95","article-title":"Epione: Lightweight contact tracing with strong privacy","volume":"43","author":"Trieu","year":"2020","journal-title":"IEEE Data Eng. Bull."},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/978-3-030-92075-3_23"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.14722\/coronadef.2021.23011"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/3490490"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/CW49994.2020.00045"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/MC.2021.3125611"},{"volume-title":"IACR Cryptol. ePrint Archive, Paper 2020\/489","author":"Fraunhofer","article-title":"Pandemic contact tracing apps: DP-3 T, PEPP-PT NTK, and ROBERT from a privacy perspective","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/3444847"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/3422337.3447829"}],"container-title":["IEEE Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4236\/10078763\/09928557.pdf?arnumber=9928557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T22:34:06Z","timestamp":1705962846000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9928557\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,1]]},"references-count":20,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/mic.2022.3213870","relation":{},"ISSN":["1089-7801","1941-0131"],"issn-type":[{"type":"print","value":"1089-7801"},{"type":"electronic","value":"1941-0131"}],"subject":[],"published":{"date-parts":[[2023,3,1]]}}}