{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:33:14Z","timestamp":1756895594785,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T00:00:00Z","timestamp":1690243200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T00:00:00Z","timestamp":1690243200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,25]]},"DOI":"10.1109\/smartnets58706.2023.10215588","type":"proceedings-article","created":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T17:32:28Z","timestamp":1692725548000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["SPIDVerify: A Secure and Privacy-Preserving Decentralised Identity Verification Framework"],"prefix":"10.1109","author":[{"given":"Abubakar-Sadiq","family":"Shehu","sequence":"first","affiliation":[{"name":"University of Porto,Faculty of Science,Department of Computer Science,Porto,Portugal"}]},{"given":"Ant\u00f3nio","family":"Pinto","sequence":"additional","affiliation":[{"name":"Polit&#x00E9;cnico do Porto CRACS &amp; INESC TEC,CIICESI, ESTG,Porto,Portugal"}]},{"given":"Manuel E.","family":"Correia","sequence":"additional","affiliation":[{"name":"University of Porto CRACS &amp; INESC TEC,Faculty of Science,Department of Computer Science,Porto,Portugal"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.001.1900020"},{"journal-title":"Common iot attacks that compromise security","year":"2023","key":"ref35"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/1431578"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-7804-5_19"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5220\/0011384700003283"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148820"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.010"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC51732.2021.9376112"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102209"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.23919\/CISTI49556.2020.9141088"},{"journal-title":"The basic building blocks of ssi","first-page":"12","year":"2020","key":"ref11"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62974-8_18"},{"key":"ref10","first-page":"15","article-title":"Universal 2nd factor (u2f) overview","author":"srinivas","year":"2015","journal-title":"FIDO Alliance Proposed Standard"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-SmartCity-DSS50907.2020.00108"},{"key":"ref2","first-page":"338","article-title":"On the interoperability of european national identity cards","author":"shehu","year":"2018","journal-title":"International Symposium on Ambient Intelligence"},{"key":"ref1","article-title":"Private digital identity on blockchain","author":"hamer","year":"2019","journal-title":"BlockSW\/CKG ISWC"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2021.100048"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2017.09.001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3544436"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"6117","DOI":"10.1109\/ACCESS.2018.2889898","article-title":"pbcert: Privacy-preserving blockchain-based certificate status validation toward mass storage management","volume":"7","author":"ruiying du","year":"2019","journal-title":"IEEE Access"},{"key":"ref19","first-page":"1341","article-title":"Platforms in everything: Analyzing ground-truth data on the anatomy and economics of bullet-proof hosting","author":"noroozian","year":"2019","journal-title":"USENIX Security Symposium"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT45670.2019.8944615"},{"journal-title":"Swarm-storage and communication infrastructure for a self-sovereign digital society","year":"2021","key":"ref24"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.06.037"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2023.100129"},{"journal-title":"Go implementation of x3dh protocol","year":"2021","key":"ref45"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3358695.3360897"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT50521.2020.00050"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01127-0"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2006","author":"hankerson","key":"ref42"},{"article-title":"Security engineering: A guide to building dependable distributed systems new york wiley computer publishing google scholar","year":"2001","author":"anderson","key":"ref41"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/9781119644682"},{"journal-title":"Self-Sovereign Identity Decentralized Digital Identity and Verifiable Credentials","year":"2021","author":"preukschat","key":"ref44"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2895123"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6631"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00914-5"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00019"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3005509"},{"key":"ref8","first-page":"3s","article-title":"Openid connect core 1.0","author":"sakimura","year":"2014","journal-title":"OpenID Foundation"},{"key":"ref7","first-page":"1","article-title":"Stork: a real, heterogeneous, large-scale eid management system","author":"ribeiro","year":"2017","journal-title":"International Journal of Information Security"},{"journal-title":"Choosing an SSO Strategy SAML vs OAuth2","year":"2013","author":"dennis","key":"ref9"},{"key":"ref4","first-page":"638","article-title":"Providing secured access delegation in identity management systems","year":"2020","journal-title":"Proceedings of the 17th International Joint Conference on e-Business and Telecommunications - SECRYPT"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.23919\/CISTI.2019.8760690"},{"journal-title":"Electronic IDentification Blog","article-title":"Eidas 2.0: What can companies expect from it?","year":"2023","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.49"},{"key":"ref40","volume":"7","author":"a draper","year":"2019","journal-title":"The Identity Trade Selling Privacy and Reputation Online"}],"event":{"name":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","start":{"date-parts":[[2023,7,25]]},"location":"Istanbul, Turkiye","end":{"date-parts":[[2023,7,27]]}},"container-title":["2023 International Conference on Smart Applications, Communications and Networking (SmartNets)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10215379\/10215514\/10215588.pdf?arnumber=10215588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T17:51:49Z","timestamp":1694454709000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10215588\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,25]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/smartnets58706.2023.10215588","relation":{},"subject":[],"published":{"date-parts":[[2023,7,25]]}}}