{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:12:50Z","timestamp":1755792770679,"version":"3.44.0"},"reference-count":58,"publisher":"IEEE","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/wf-iot.2016.7845505","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T16:42:54Z","timestamp":1486658574000},"page":"13-18","source":"Crossref","is-referenced-by-count":15,"title":["A privacy framework for the Internet of Things"],"prefix":"10.1109","author":[{"given":"Peter M.","family":"Corcoran","sequence":"first","affiliation":[{"name":"College of Engineeing &amp; Informatics, National University of Ireland Galway, Galway, Ireland"}]}],"member":"263","reference":[{"journal-title":"Emerging Trends in Electricity Consumption for Consumer ICT","year":"2013","author":"andrae","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2013.2257608"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2314127"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2015.2393008"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.3"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2015.7179382"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2012.08.001"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2010.937031"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2013.6490254"},{"key":"ref34","first-page":"282","article-title":"A Privacy-Preserving Contactless TransportService for NFC Smartphones","volume":"130","author":"arfaoui","year":"2013","journal-title":"Fifth Int Conf Mob Comput Appl Serv"},{"key":"ref28","first-page":"515","article-title":"P3: Toward Privacy-Preserving Photo Sharing","author":"ra","year":"2013","journal-title":"NSDI"},{"key":"ref27","first-page":"235","article-title":"Privacy-preserving face recognition","volume":"5672","author":"erkin","year":"2009","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref29","first-page":"959911","article-title":"Privacy-preserving photo sharing based on a public key infrastructure","author":"yuan","year":"2015","journal-title":"Proc SPIE 9599 Applications of Digital Image Processing XXXVIII"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1674-7_38"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2016.7430567"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2015.7150600"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2013.2239152"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2016.2521937"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2015.7150566"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996276"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2016.7430567"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2185520.2185561"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00017-X"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s10772-011-9125-1"},{"key":"ref57","first-page":"2029","article-title":"Large-scale personal assistant technology deployment: The siri experience","author":"bellegarda","year":"0","journal-title":"Proceedings of the Annual Conference of the International Speech Communication Association INTERSPEECH 2013"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2016.7430628"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2012.6227433"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.30"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2008.4637622"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/T-AFFC.2011.37"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2011.5722509"},{"key":"ref11","article-title":"Securacy: an empirical investigation of Android applications' network usage, privacy and security","author":"ferreira","year":"2015","journal-title":"Secur Priv &#x2026;"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2015.2421534"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"ref13","first-page":"237","article-title":"A Privacy Awareness System for Ubiquitous Computing Environments","author":"langheinrich","year":"2002","journal-title":"UbiComp '02 Proc 4th Int Conf Ubiquitous Comput"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1013115.1013129"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0210-7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2010.05.005"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5170-5_1"},{"key":"ref18","article-title":"Introduction to dataveillance and information privacy, and definitions of terms","author":"clarke","year":"1999","journal-title":"Roger Clarke's Dataveillance and Information Privacy"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.63"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/sec.795"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.11.008"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.046"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.07.002"},{"key":"ref7","article-title":"Regulating the internet of things: First steps toward managing discrimination, privacy, security and consent","author":"peppet","year":"2014","journal-title":"Tex Law Rev"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2016.36"},{"key":"ref9","first-page":"482","article-title":"iOS security and privacy: Authentication methods, permissions, and potential pitfalls with touch id","volume":"3","author":"tipton","year":"2014","journal-title":"Int J of Computer and Inf Tech"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2010.5505930"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2235848"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2014.6776135"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2012.2203210"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2014.2321637"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2015.2484659"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2010.5543262"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-Berlin.2011.6031855"}],"event":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","start":{"date-parts":[[2016,12,12]]},"location":"Reston, VA, USA","end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7831562\/7845389\/07845505.pdf?arnumber=7845505","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T18:43:31Z","timestamp":1755197011000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7845505\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2016.7845505","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}