{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:40Z","timestamp":1750220680809,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3447847","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"251-256","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Pull Printing with QR Codes and National eID Cards"],"prefix":"10.1145","author":[{"given":"Matteo","family":"Leonelli","sequence":"first","affiliation":[{"name":"Fondazione Bruno Kessler, Trento, Italy"}]},{"given":"Umberto","family":"Morelli","sequence":"additional","affiliation":[{"name":"Fondazione Bruno Kessler, Trento, Italy"}]},{"given":"Giada","family":"Sciarretta","sequence":"additional","affiliation":[{"name":"Fondazione Bruno Kessler, Trento, Italy"}]},{"given":"Silvio","family":"Ranise","sequence":"additional","affiliation":[{"name":"Fondazione Bruno Kessler &amp; University of Trento, Trento, Italy"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"http:\/\/data.europa.eu\/eli\/reg\/2014\/910\/oj","author":"European Parliament and Council of the European Union. Regulation (EU) No 910\/2014 on electronic identification and trust services for electronic transactions in the internal market.","year":"2014","unstructured":"European Parliament and Council of the European Union. Regulation (EU) No 910\/2014 on electronic identification and trust services for electronic transactions in the internal market. http:\/\/data.europa.eu\/eli\/reg\/2014\/910\/oj , 2014 . European Parliament and Council of the European Union. Regulation (EU) No 910\/2014 on electronic identification and trust services for electronic transactions in the internal market. http:\/\/data.europa.eu\/eli\/reg\/2014\/910\/oj, 2014."},{"key":"e_1_3_2_2_2_1","volume-title":"The General Data Protection Regulation (GDPR). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679","author":"European Parliament and Council of the European Union.","year":"2016","unstructured":"European Parliament and Council of the European Union. The General Data Protection Regulation (GDPR). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679 , 2016 . European Parliament and Council of the European Union. The General Data Protection Regulation (GDPR). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679, 2016."},{"key":"e_1_3_2_2_3_1","volume-title":"OpenID Connect Core 1.0 incorporating errata set 1. Technical report","author":"Foundation ID","year":"2014","unstructured":"Open ID Foundation . OpenID Connect Core 1.0 incorporating errata set 1. Technical report , OpenID Foundation , 2014 . OpenID Foundation. OpenID Connect Core 1.0 incorporating errata set 1. Technical report, OpenID Foundation, 2014."},{"key":"e_1_3_2_2_4_1","unstructured":"GIXEL. European Card for e-Services and National e-ID Applications - IAS ECC. http:\/\/www.unsads.com\/specs\/IASECC\/IAS_ECC_v1.0.1_UK.pdf March 2008.  GIXEL. European Card for e-Services and National e-ID Applications - IAS ECC. http:\/\/www.unsads.com\/specs\/IASECC\/IAS_ECC_v1.0.1_UK.pdf March 2008."},{"key":"e_1_3_2_2_5_1","unstructured":"Google. Developer Security Best Practices. https:\/\/developer.android.com\/topic\/security\/best-practices Last accessed: 12\/10\/2020.  Google. Developer Security Best Practices. https:\/\/developer.android.com\/topic\/security\/best-practices Last accessed: 12\/10\/2020."},{"key":"e_1_3_2_2_6_1","volume-title":"https:\/\/www.icao.int\/publications\/pages\/publication.aspx?docnum=9303","author":"Machine Readable Travel Documents ICAO.","year":"2015","unstructured":"ICAO. Machine Readable Travel Documents . https:\/\/www.icao.int\/publications\/pages\/publication.aspx?docnum=9303 , 2015 . ICAO. Machine Readable Travel Documents. https:\/\/www.icao.int\/publications\/pages\/publication.aspx?docnum=9303, 2015."},{"key":"e_1_3_2_2_7_1","volume-title":"http:\/\/www.cartaidentita.interno.gov.it\/wp-content\/uploads\/2016\/07\/cie_3.0_-_specifiche_chip.pdf","author":"Specifiche Chip IPZS. CIE","year":"2015","unstructured":"IPZS. CIE 3.0 -- Specifiche Chip . http:\/\/www.cartaidentita.interno.gov.it\/wp-content\/uploads\/2016\/07\/cie_3.0_-_specifiche_chip.pdf , 2015 . IPZS. CIE 3.0 -- Specifiche Chip. http:\/\/www.cartaidentita.interno.gov.it\/wp-content\/uploads\/2016\/07\/cie_3.0_-_specifiche_chip.pdf, 2015."},{"key":"e_1_3_2_2_8_1","volume-title":"Why the Hell Would You Use Node.js. https:\/\/link.medium.com\/EN5qoDJIIdb","author":"Node Medium","year":"2019","unstructured":"Medium - Node .js Collection. Why the Hell Would You Use Node.js. https:\/\/link.medium.com\/EN5qoDJIIdb , 2019 . Medium - Node.js Collection. Why the Hell Would You Use Node.js. https:\/\/link.medium.com\/EN5qoDJIIdb, 2019."},{"key":"e_1_3_2_2_9_1","volume-title":"Smartphone Guidelines Tool. https:\/\/www.enisa.europa.eu\/topics\/iot-and-smart-infrastructures\/smartphone-guidelines-tool","author":"European Network and Information Security Agency","year":"2019","unstructured":"European Network and Information Security Agency . Smartphone Guidelines Tool. https:\/\/www.enisa.europa.eu\/topics\/iot-and-smart-infrastructures\/smartphone-guidelines-tool , 2019 . European Network and Information Security Agency. Smartphone Guidelines Tool. https:\/\/www.enisa.europa.eu\/topics\/iot-and-smart-infrastructures\/smartphone-guidelines-tool, 2019."},{"volume-title":"Global Print Security Landscape. https:\/\/quocirca.com\/content\/quocirca-global-print-security-landscape-2019","year":"2019","key":"e_1_3_2_2_10_1","unstructured":"Quocirca. Global Print Security Landscape. https:\/\/quocirca.com\/content\/quocirca-global-print-security-landscape-2019 , 2019 . Quocirca. Global Print Security Landscape. https:\/\/quocirca.com\/content\/quocirca-global-print-security-landscape-2019, 2019."},{"key":"e_1_3_2_2_11_1","volume-title":"A new fine for the application of gdpr. https:\/\/www.dataprotection.ro\/index.jsp?page=O_noua_amenda_GDPR&lang=en","author":"Romanian National Supervisory Authority for Personal Data Processing (ANSPDCP).","year":"2019","unstructured":"Romanian National Supervisory Authority for Personal Data Processing (ANSPDCP). A new fine for the application of gdpr. https:\/\/www.dataprotection.ro\/index.jsp?page=O_noua_amenda_GDPR&lang=en , 2019 . Romanian National Supervisory Authority for Personal Data Processing (ANSPDCP). A new fine for the application of gdpr. https:\/\/www.dataprotection.ro\/index.jsp?page=O_noua_amenda_GDPR&lang=en, 2019."},{"key":"e_1_3_2_2_12_1","volume-title":"Internet Engineering Task Force (IETF)","author":"Sakimura Nat","year":"2015","unstructured":"Nat Sakimura , John Bradley , and Naveen Agarwal . Proof Key for Code Exchange by OAuth Public Clients (RFC7636) . Internet Engineering Task Force (IETF) , 2015 . Nat Sakimura, John Bradley, and Naveen Agarwal. Proof Key for Code Exchange by OAuth Public Clients (RFC7636). Internet Engineering Task Force (IETF), 2015."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.5220\/0007930502680275"},{"volume-title":"Mobile Operating System Market Share Worldwide. https:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide","year":"2019","key":"e_1_3_2_2_14_1","unstructured":"Statcounter. Mobile Operating System Market Share Worldwide. https:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide , 2019 . Statcounter. Mobile Operating System Market Share Worldwide. https:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide, 2019."},{"key":"e_1_3_2_2_15_1","volume-title":"OWASP Secure Coding Practices. Quick Reference Guide v2.0. https:\/\/www.owasp.org\/images\/0\/08\/OWASP_SCP_Quick_Reference_Guide_v2.pdf","author":"Foundation The OWASP","year":"2010","unstructured":"The OWASP Foundation . OWASP Secure Coding Practices. Quick Reference Guide v2.0. https:\/\/www.owasp.org\/images\/0\/08\/OWASP_SCP_Quick_Reference_Guide_v2.pdf , 2010 . The OWASP Foundation. OWASP Secure Coding Practices. Quick Reference Guide v2.0. https:\/\/www.owasp.org\/images\/0\/08\/OWASP_SCP_Quick_Reference_Guide_v2.pdf, 2010."},{"key":"e_1_3_2_2_16_1","volume-title":"OWASP Mobile Top 10. https:\/\/owasp.org\/www-project-mobile-top-10","author":"Foundation The OWASP","year":"2016","unstructured":"The OWASP Foundation . OWASP Mobile Top 10. https:\/\/owasp.org\/www-project-mobile-top-10 , 2016 . The OWASP Foundation. OWASP Mobile Top 10. https:\/\/owasp.org\/www-project-mobile-top-10, 2016."},{"key":"e_1_3_2_2_17_1","volume-title":"Top 10 Web Application Security Risks. https:\/\/owasp.org\/www-project-top-ten\/","author":"Foundation The OWASP","year":"2017","unstructured":"The OWASP Foundation . Top 10 Web Application Security Risks. https:\/\/owasp.org\/www-project-top-ten\/ , 2017 . The OWASP Foundation. Top 10 Web Application Security Risks. https:\/\/owasp.org\/www-project-top-ten\/, 2017."}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CODASPY '21"},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447847","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447847"}},"subtitle":["A Software-oriented Design and an Open-source Implementation"],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":17,"alternative-id":["10.1145\/3422337.3447847","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3447847","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}