{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T02:53:47Z","timestamp":1775271227766,"version":"3.50.1"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179373","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"1491-1508","source":"Crossref","is-referenced-by-count":14,"title":["Token meets Wallet: Formalizing Privacy and Revocation for FIDO2"],"prefix":"10.1109","author":[{"given":"Lucjan","family":"Hanzlik","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security"}]},{"given":"Julian","family":"Loss","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security"}]},{"given":"Benedikt","family":"Wagner","sequence":"additional","affiliation":[{"name":"Saarland University,CISPA Helmholtz Center for Information Security"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Client to Authenticator Protocol (CTAP)","year":"2019"},{"key":"ref2","article-title":"Web Authentication: An API for accessing Public Key Credentials","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84252-9_5"},{"key":"ref4","article-title":"FIDO2, CTAP 2.1, and WebAuthn 2: Provable security and post-quantum instantiation","volume-title":"Cryptology ePrint Archive, Report 2022\/1029","author":"Bindel","year":"2022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3190619.3190640"},{"key":"ref6","article-title":"How not to handle keys: Timing attacks on FIDO authenticator privacy","volume-title":"CoRR","volume":"abs\/2205.08071","author":"Kepkowski","year":"2022"},{"key":"ref7","article-title":"Yubikey U2F Key Generation","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00047"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484807"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363283"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363258"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030106"},{"key":"ref14","first-page":"123","article-title":"Scalable revocation scheme for anonymous credentials based on n-times unlinkable proofs","volume-title":"Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016","author":"Camenisch"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00048"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417292"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022595222606"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75670-5_1"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_22"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_38"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30539-2_22"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18178-8_6"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66402-6_18"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49384-7_12"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354236"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_23"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_11"},{"key":"ref30","article-title":"Token meets wallet: Formalizing privacy and revocation for FIDO2","volume-title":"Cryptology ePrint Archive, Report 2022\/084","author":"Hanzlik","year":"2022"},{"key":"ref31","article-title":"Bip32 proposal","author":"Wiki"},{"key":"ref32","volume-title":"Token meets Wallet - Full Version"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.17487\/rfc5280","article-title":"Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile","volume-title":"Internet Requests for Comments, RFC Editor, RFC 5280","author":"Cooper","year":"2008"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502011"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36492-7_7"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179373.pdf?arnumber=10179373","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T04:40:52Z","timestamp":1721450452000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179373\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179373","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}