{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:31:57Z","timestamp":1740169917225,"version":"3.37.3"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["SFB-1119 CROSSING\/236615297"],"award-info":[{"award-number":["SFB-1119 CROSSING\/236615297"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1109\/tetc.2022.3216473","type":"journal-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T00:43:08Z","timestamp":1667522588000},"page":"483-495","source":"Crossref","is-referenced-by-count":2,"title":["Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5743-9589","authenticated-orcid":false,"given":"Thien Duc","family":"Nguyen","sequence":"first","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5861-8829","authenticated-orcid":false,"given":"Markus","family":"Miettinen","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5637-7016","authenticated-orcid":false,"given":"Alexandra","family":"Dmitrienko","sequence":"additional","affiliation":[{"name":"JMU W&#x00FC;rzburg, W&#x00FC;rzburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6833-3598","authenticated-orcid":false,"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2381-5846","authenticated-orcid":false,"given":"Ivan","family":"Visconti","sequence":"additional","affiliation":[{"name":"University of Salerno, Fisciano, Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1126\/science.abb6936"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-021-03606-z"},{"year":"2020","key":"ref3","article-title":"Exposure notification: Cryptography specification, v1.2"},{"article-title":"Security analysis of the COVID-19 contact tracing specifications by apple Inc. and Google Inc.","year":"2020","author":"Gvili","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00069"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75539-3_18"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78372-3_9"},{"article-title":"Digital contact tracing solutions: Promises, pitfalls and challenges","year":"2022","author":"Nguyen","key":"ref8"},{"article-title":"Bluetrace: A privacy-preserving protocol for community-driven contact tracing across borders","year":"2020","author":"Bay","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0239943"},{"key":"ref11","article-title":"Decentralized privacy-preserving proximity tracing","volume-title":"CoRR","volume":"abs\/2005.12273","author":"Troncoso","year":"2020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/iccworkshops50388.2021.9473758"},{"article-title":"Analysis of DP-3T","year":"2020","author":"Vaudenay","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1136\/medethics-2020-107061","article-title":"Without a trace: Why did corona apps fail?","volume-title":"J. Medical Ethics","author":"White","year":"2021"},{"article-title":"Privacy-preserving automated exposure notification","year":"2020","author":"Canetti","key":"ref15"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.14722\/coronadef.2021.23013","article-title":"Towards defeating mass surveillance and SARS-CoV-2: The pronto-C2 fully decentralized automatic contact tracing system","author":"Avitabile","year":"2021"},{"article-title":"Epione: Lightweight contact tracing with strong privacy","year":"2020","author":"Trieu","key":"ref17"},{"year":"2020","key":"ref18","article-title":"TraceTogether contact tracing app"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.14722\/coronadef.2021.23010","article-title":"Ovid: Message-based automatic contact tracing","author":"Reichert","year":"2021"},{"article-title":"Centralized or decentralized? The contact tracing dilemma","year":"2020","author":"Vaudenay","key":"ref20"},{"article-title":"SwissCovid: A critical analysis of risk assessment by swiss authorities","year":"2020","author":"Dehaye","key":"ref21"},{"year":"2020","key":"ref22","article-title":"PEPP-PT"},{"article-title":"The pact protocol specification","year":"2020","author":"Rivest","key":"ref23"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_12"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion52605.2021.00074"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63086-7_17"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010226"},{"author":"Brighton-Knight","key":"ref29","article-title":"Linkability of rolling proximity identifiers in googles implementation of the exposure notification system"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3527279"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/10552369\/09931613.pdf?arnumber=9931613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T20:28:45Z","timestamp":1719347325000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9931613\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":29,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2022.3216473","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"type":"electronic","value":"2168-6750"},{"type":"electronic","value":"2376-4562"}],"subject":[],"published":{"date-parts":[[2024,4]]}}}