{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T06:21:45Z","timestamp":1773382905635,"version":"3.50.1"},"reference-count":59,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179306","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"645-663","source":"Crossref","is-referenced-by-count":6,"title":["Not Yet Another Digital ID: Privacy-Preserving Humanitarian Aid Distribution"],"prefix":"10.1109","author":[{"given":"Boya","family":"Wang","sequence":"first","affiliation":[{"name":"EPFL,SPRING Lab,Lausanne,Switzerland"}]},{"given":"Wouter","family":"Lueks","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security,Saarbr&#x00FC;cken,Germany"}]},{"given":"Justinas","family":"Sukaitis","sequence":"additional","affiliation":[{"name":"International Committee of the Red Cross,Geneva,Switzerland"}]},{"given":"Vincent Graf","family":"Narbel","sequence":"additional","affiliation":[{"name":"International Committee of the Red Cross,Geneva,Switzerland"}]},{"given":"Carmela","family":"Troncoso","sequence":"additional","affiliation":[{"name":"EPFL,SPRING Lab,Lausanne,Switzerland"}]}],"member":"263","reference":[{"key":"ref1","article-title":"African Union Convention on Cyber Security and Personal Data Protection","year":"2014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221931"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516687"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3149732"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.37"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00019"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030106"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"ref10","volume-title":"Doing no harm\u201d in the digital age: What the digitalization of cash means for humanitarian action","author":"Burton","year":"2020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36413-7_20"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108712"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660328"},{"key":"ref14","article-title":"Humanitarian Biometrics in Yemen: The complex politics of humanitarian technology","author":"Clausen","year":"2021"},{"key":"ref15","article-title":"Supporting Non-membership Proofs with Bilinear-map Accumulators","author":"Damg\u00e5rd","year":"2008","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0026"},{"key":"ref17","article-title":"General Data Protection Regulation (EU) (GDPR)","year":"2016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0042"},{"key":"ref19","article-title":"FIDO 2.0: Overview","year":"2017"},{"key":"ref20","article-title":"Group Classification on National ID Cards as a Factor in Genocide and Ethnic Cleansing","author":"Fussell","year":"2001"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3448620"},{"key":"ref22","article-title":"Passive Taxonomy of Wifi Clients Using MLME Frame Contents","author":"Gentry","year":"2016","journal-title":"CoRR"},{"key":"ref23","article-title":"Facilitating innovation, ensuring protection: the ICRC Biometrics Policy","author":"Hayes","year":"2019"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517855"},{"key":"ref25","article-title":"Aiding Surveillance","volume-title":"Tech. Rep.","author":"Hosein","year":"20013"},{"key":"ref26","article-title":"New Evidence that Biometric Data Systems Imperil Afghans","year":"2022"},{"key":"ref27","article-title":"EcoSec Response"},{"key":"ref28","article-title":"Targeting, Selection, and Prioritization Methods for Economic Security Programmes"},{"key":"ref29","article-title":"Guidelines for Cash Transfer Programming","year":"2007"},{"key":"ref30","article-title":"The ICRC: Its Mission and Work","year":"2009"},{"key":"ref31","article-title":"Policy on the Processing of Biometric Data by the ICRC","year":"2019"},{"key":"ref32","article-title":"Evidence-based Decision-making in Delegations: Analysis and Evidence Planning Guidance","year":"2021"},{"key":"ref33","article-title":"ICRC Annual Report Africa 2021","year":"2021"},{"key":"ref34","article-title":"The ICRC\u2019s funding and spending","year":"2022"},{"key":"ref35","year":"2015","journal-title":"Information technology \u2014 Automatic identification and data capture techniques \u2014 QR Code bar code symbology specification"},{"key":"ref36","article-title":"The digital transformation of the humanitarian sector","author":"Kaspersen","year":"2016"},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.1201\/b17668","volume-title":"Introduction to Modern Cryptography, Second Edition.","author":"Katz","year":"2014"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07620-1_8"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24712-5_1"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_17"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0054"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00022"},{"key":"ref43","article-title":"National Database and Registration Authority - ESCAP","year":"2022"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_19"},{"key":"ref45","article-title":"Java Card Development Kit User Guide","year":"2021"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_7"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2820728"},{"key":"ref49","article-title":"A Model for Humanitarian Aid Beneficiary Targeting","author":"Schwartz","year":"2019"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.geoforum.2015.07.002"},{"key":"ref51","article-title":"Rust","year":"2022"},{"key":"ref52","article-title":"Beneficiary Assessment","year":"2004"},{"key":"ref53","article-title":"Privacy Impact Assessment of UNHCR Cash Based Interventions","year":"2015"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1880022.1880033"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897883"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.3390\/info11040217"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179306"},{"key":"ref58","article-title":"Joint Inspection of the Biometrics Identification System for Food Distribution in Kenya","year":"2015"},{"key":"ref59","article-title":"You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi","author":"Yu","year":"2020","journal-title":"USENIX Security"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179306.pdf?arnumber=10179306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:13:24Z","timestamp":1721452404000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179306\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179306","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}