{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T07:13:44Z","timestamp":1770448424472,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/pst.2016.7907022","type":"proceedings-article","created":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T21:12:50Z","timestamp":1493068370000},"page":"706-713","source":"Crossref","is-referenced-by-count":21,"title":["PISCES: A framework for privacy by design in IoT"],"prefix":"10.1109","author":[{"given":"Noria","family":"Foukia","sequence":"first","affiliation":[]},{"given":"David","family":"Billard","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Solana","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref11","first-page":"199","article-title":"Blind Signatures for Untraceable Payments","author":"chaum","year":"1982","journal-title":"Advances in Cryptology Proceedings of CRYPTO82 Santa Barbara"},{"key":"ref12","author":"cavoukian","year":"2012","journal-title":"Operationalizing Privacy by Design A Guide to Implementing Strong Privacy Practices"},{"key":"ref13","first-page":"45","author":"rouvroy","year":"2009","journal-title":"The Right to Informational Self-Determination and the Value of Self-Development Reassessing the Importance of Privacy for Democracy"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0346-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/080321"},{"key":"ref16","year":"2006","journal-title":"The Platform for Privacy Preferences 1 1 (P3P1 1) Specification"},{"key":"ref17","article-title":"Decentralizing Privacy: Using Blockchain to Protect Personal Data","author":"zyskind","year":"2015","journal-title":"Media Laboratory MIT Cambridge"},{"key":"ref18","first-page":"53","article-title":"Kademilia: A Peer-to-Peer Information System Based on the XOR Metric","author":"maymounkov","year":"2002","journal-title":"P2P-Systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref4","article-title":"Communication from the Commission to the European Parliament and the Council on promoting data protection by privacy-enhancing technologies","year":"2007","journal-title":"COM(2007) 228 final Not published in the Official Journal"},{"key":"ref3","article-title":"The Value of Privacy Engineering","author":"kenny","year":"2002","journal-title":"Journal of Information Law and Technology"},{"key":"ref6","author":"cavoukian","year":"2011","journal-title":"Privacy by Design The 7 Foundational Principles"},{"key":"ref5","article-title":"Protecting Privacy and Fighting Spam","year":"2006","journal-title":"European Commission - Information Society and Media DG"},{"key":"ref8","article-title":"European Parliament legislative resolution of 12 March 2014 on the proposal for a regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation)","year":"0","journal-title":"(COM(201210011C7&#x2013;0025\/20122012\/0011(COD))"},{"key":"ref7","first-page":"37","article-title":"EU Directive 2002\/58\/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications)","year":"2002","journal-title":"Official Journal of the European Communities L201 31\/07\/2002"},{"key":"ref2","first-page":"31","year":"1995","journal-title":"EU Data Protection Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data Official Journal L281"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54069-1_4"},{"key":"ref9","year":"2016","journal-title":"EU Directive 2016\/680 the European Parliament and of the Council of"},{"key":"ref20","article-title":"A Terminology for Talking about Privacy by Data Minimization: Anonymity","author":"pfitzmann","year":"2010","journal-title":"Unlinkability Undetectability Unob-servability Pseudonymity and Identity Management v0 34"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-0641-5_15"},{"key":"ref21","author":"coull","year":"2009","journal-title":"Methods for Evaluating the Privacy of Anonymized Network Data"},{"key":"ref24","year":"0","journal-title":"PrimeLife-Bringing Sustainable Privacy and Identity Management to Future Networks and Services Project at"},{"key":"ref23","year":"0","journal-title":"PRIME-Privacy and Identity Management for Europe Project at"}],"event":{"name":"2016 14th Annual Conference on Privacy, Security and Trust (PST)","location":"Auckland, New Zealand","start":{"date-parts":[[2016,12,12]]},"end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 14th Annual Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7899233\/7906913\/07907022.pdf?arnumber=7907022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T02:32:25Z","timestamp":1506997945000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7907022\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/pst.2016.7907022","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}