{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T10:20:12Z","timestamp":1756635612737,"version":"3.37.3"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tdsc.2022.3186153","type":"journal-article","created":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T19:36:30Z","timestamp":1656099390000},"page":"1-17","source":"Crossref","is-referenced-by-count":2,"title":["SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3324-3706","authenticated-orcid":false,"given":"Pietro","family":"Tedeschi","sequence":"first","affiliation":[{"name":"Technology Innovation Institute, Secure Systems Research Center, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8964-0746","authenticated-orcid":false,"given":"Spiridon","family":"Bakiras","sequence":"additional","affiliation":[{"name":"Infocomm Technology Cluster, Singapore Institute of Technology, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1909-0336","authenticated-orcid":false,"given":"Roberto Di","family":"Pietro","sequence":"additional","affiliation":[{"name":"Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63086-7_17"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1126\/science.abb6936"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8851429"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3064323"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100397"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3055675"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000729"},{"article-title":"On using bluetooth-low-energy for contact tracing","year":"2020","author":"Cunche","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010226"},{"article-title":"Vetting security and privacy of global COVID-19 contact tracing applications","year":"2020","author":"Sun","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3020513"},{"article-title":"Proverif - formal verification code of SpreadMeNot","year":"2021","author":"Tedeschi","key":"ref16"},{"volume-title":"Inside Bluetooth Low Energy","year":"2016","author":"Gupta","key":"ref18"},{"year":"2020","key":"ref19","article-title":"Global positioning system standard positioning service performance standard (GPS SPS PS), 5th ed."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2897166"},{"volume-title":"Guide to Elliptic Curve Cryptography","year":"2003","author":"Hankerson","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/0470846003"},{"article-title":"Security analysis of the COVID-19 contact tracing specifications by apple Inc. and Google Inc.","year":"2020","author":"Gvili","key":"ref23"},{"article-title":"Analysis of DP3T","year":"2020","author":"Vaudenay","key":"ref24"},{"article-title":"Assessing disease exposure risk with location data: A proposal for cryptographic preservation of privacy","year":"2020","author":"Berke","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3319719"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/PEITS.2009.5406988"},{"key":"ref32","article-title":"BlueTrace: A privacy-preserving protocol for community-driven contact tracing across borders","volume":"18","author":"Bay","year":"2020"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92075-3_23"},{"article-title":"DESIRE: A 3rd way for a european exposure notification system leveraging the best of centralized and decentralized systems","year":"2020","author":"Castelluccia","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103356"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocaa153"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3024180"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2013.6488558"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010226"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18283-9_9"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3233\/jcs-2009-0339"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162320"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2940908"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2621354"},{"year":"2020","key":"ref48","article-title":"OpenSSL - cryptography and SSL\/TLS toolbox"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-57pt1r5"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/4358699\/09806335.pdf?arnumber=9806335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T01:32:12Z","timestamp":1709343132000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9806335\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/tdsc.2022.3186153","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2022]]}}}