{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:51:02Z","timestamp":1774367462150,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"The financial support by the Federal State of Salzburg is gratefully acknowledged."}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,14]]},"DOI":"10.1145\/3446983.3446992","type":"proceedings-article","created":{"date-parts":[[2021,3,22]],"date-time":"2021-03-22T01:59:33Z","timestamp":1616378373000},"page":"61-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["DID and VC:Untangling Decentralized Identifiers and Verifiable Credentials for the Web of Trust"],"prefix":"10.1145","author":[{"given":"Clemens","family":"Brunner","sequence":"first","affiliation":[{"name":"Center for Secure Energy Informatics Salzburg University of Applied Sciences, Austria"}]},{"given":"Ulrich","family":"Gallersd\u00f6rfer","sequence":"additional","affiliation":[{"name":"Software Engineering for Business Information Systems TU Munich, Germany"}]},{"given":"Fabian","family":"Knirsch","sequence":"additional","affiliation":[{"name":"Center for Secure Energy Informatics Salzburg University of Applied Sciences, Austria"}]},{"given":"Dominik","family":"Engel","sequence":"additional","affiliation":[{"name":"Center for Secure Energy Informatics Salzburg University of Applied Sciences, Austria"}]},{"given":"Florian","family":"Matthes","sequence":"additional","affiliation":[{"name":"Software Engineering for Business Information Systems TU Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Christopher Allen. 2016. The Path to Self-Sovereign Identity. http:\/\/www.lifewithalacrity.com\/2016\/04\/the-path-to-self-soverereign-identity.html  Christopher Allen. 2016. The Path to Self-Sovereign Identity. http:\/\/www.lifewithalacrity.com\/2016\/04\/the-path-to-self-soverereign-identity.html"},{"key":"e_1_3_2_1_2_1","unstructured":"Arthur Brock Kaliya Hamlin Grace Rachmany and Jakub Lanc. 2019. Reputation Interpretation. https:\/\/github.com\/WebOfTrustInfo\/rwot9-prague\/blob\/master\/final-documents\/reputation-interpretation.pdf  Arthur Brock Kaliya Hamlin Grace Rachmany and Jakub Lanc. 2019. Reputation Interpretation. https:\/\/github.com\/WebOfTrustInfo\/rwot9-prague\/blob\/master\/final-documents\/reputation-interpretation.pdf"},{"key":"e_1_3_2_1_3_1","volume-title":"Who stores the private key? An Exploratory Study about User Preferences of Key Management for Blockchain-based Applications. submitted to ICISSP","author":"Brunner Clemens","year":"2021","unstructured":"Clemens Brunner , G\u00fcnther Eibl , Peter Fr\u00f6hlich , Andreas Sackl , and Dominik Engel . 2020. Who stores the private key? An Exploratory Study about User Preferences of Key Management for Blockchain-based Applications. submitted to ICISSP 2021 . Clemens Brunner, G\u00fcnther Eibl, Peter Fr\u00f6hlich, Andreas Sackl, and Dominik Engel. 2020. Who stores the private key? An Exploratory Study about User Preferences of Key Management for Blockchain-based Applications. submitted to ICISSP 2021."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5220\/0007245600150025"},{"key":"e_1_3_2_1_5_1","article-title":"Regulation (EU) No 910\/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/EC","volume":"57","author":"Council of the European Union.","year":"2014","unstructured":"Council of the European Union. 2014 . Regulation (EU) No 910\/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/EC . Official Journal of the European Union 57 , L 257 (2014), 73\u2013114. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:32014R0910 Council of the European Union. 2014. Regulation (EU) No 910\/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/EC. Official Journal of the European Union 57, L 257 (2014), 73\u2013114. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:32014R0910","journal-title":"Official Journal of the European Union"},{"key":"e_1_3_2_1_6_1","unstructured":"P. Dingle S. Hammann D. Hardman C. Winczewski and S. Smith. 2019. Alice Atempts to Abuse a Verifable Credental. https:\/\/github.com\/WebOfTrustInfo\/rwot9-prague\/blob\/master\/final-documents\/alice-attempts-abuse-verifiable-credential.pdf  P. Dingle S. Hammann D. Hardman C. Winczewski and S. Smith. 2019. Alice Atempts to Abuse a Verifable Credental. https:\/\/github.com\/WebOfTrustInfo\/rwot9-prague\/blob\/master\/final-documents\/alice-attempts-abuse-verifiable-credential.pdf"},{"key":"e_1_3_2_1_7_1","unstructured":"Evernym. 2021. White Papers - Evernym. https:\/\/www.evernym.com\/white-papers\/  Evernym. 2021. White Papers - Evernym. https:\/\/www.evernym.com\/white-papers\/"},{"key":"e_1_3_2_1_8_1","unstructured":"Ulrich Gallersd\u00f6rfer and Florian Matthes. 2020. AuthSC: Mind the Gap between Web and Smart Contracts. arxiv:2004.14033\u00a0[cs.CR]  Ulrich Gallersd\u00f6rfer and Florian Matthes. 2020. AuthSC: Mind the Gap between Web and Smart Contracts. arxiv:2004.14033\u00a0[cs.CR]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341105.3374066"},{"key":"e_1_3_2_1_11_1","volume-title":"FIDO Alliance","author":"Lindemann Rolf","year":"2014","unstructured":"Rolf Lindemann , Davit Baghdasaryan , and Eric Tiffany . 2014 . FIDO Universal Authentication Framework Protocol. Version v1. 0-rd-20140209 , FIDO Alliance , February (2014). Rolf Lindemann, Davit Baghdasaryan, and Eric Tiffany. 2014. FIDO Universal Authentication Framework Protocol. Version v1. 0-rd-20140209, FIDO Alliance, February (2014)."},{"key":"#cr-split#-e_1_3_2_1_12_1.1","doi-asserted-by":"crossref","unstructured":"Alexander M\u00fchle Andreas Gr\u00fcner Tatiana Gayvoronskaya and Christoph Meinel. 2018. A survey on essential components of a self-sovereign identity. 80-86\u00a0pages. https:\/\/doi.org\/10.1016\/j.cosrev.2018.10.002 10.1016\/j.cosrev.2018.10.002","DOI":"10.1016\/j.cosrev.2018.10.002"},{"key":"#cr-split#-e_1_3_2_1_12_1.2","doi-asserted-by":"crossref","unstructured":"Alexander M\u00fchle Andreas Gr\u00fcner Tatiana Gayvoronskaya and Christoph Meinel. 2018. A survey on essential components of a self-sovereign identity. 80-86\u00a0pages. https:\/\/doi.org\/10.1016\/j.cosrev.2018.10.002","DOI":"10.1016\/j.cosrev.2018.10.002"},{"key":"e_1_3_2_1_13_1","unstructured":"Drummond Reed Manu Sporny Dave Longley Christopher Allen Ryan Grant and Markus Sabadello. 2019. Decentralized Identifiers (DIDs) v1.0. https:\/\/www.w3.org\/TR\/did-core\/  Drummond Reed Manu Sporny Dave Longley Christopher Allen Ryan Grant and Markus Sabadello. 2019. Decentralized Identifiers (DIDs) v1.0. https:\/\/www.w3.org\/TR\/did-core\/"},{"key":"e_1_3_2_1_14_1","unstructured":"Drummond Reed Manu Sporny Dave Longley Christopher Allen Ryan Grant and Markus Sabadello. 2020. Decentralized Identifiers (DIDs) v1.0 Core architecture data model and representations. DIDs v1.0. https:\/\/www.w3.org\/TR\/did-core\/  Drummond Reed Manu Sporny Dave Longley Christopher Allen Ryan Grant and Markus Sabadello. 2020. Decentralized Identifiers (DIDs) v1.0 Core architecture data model and representations. DIDs v1.0. https:\/\/www.w3.org\/TR\/did-core\/"},{"key":"e_1_3_2_1_15_1","unstructured":"Anthony Ronning and Wong\u00a0Wai Chung. 2019. Blockcerts V3 Proposal. https:\/\/github.com\/WebOfTrustInfo\/rwot9-prague\/blob\/master\/final-documents\/BlockcertsV3.pdf  Anthony Ronning and Wong\u00a0Wai Chung. 2019. Blockcerts V3 Proposal. https:\/\/github.com\/WebOfTrustInfo\/rwot9-prague\/blob\/master\/final-documents\/BlockcertsV3.pdf"},{"key":"e_1_3_2_1_16_1","volume-title":"RWOT: White Papers. https:\/\/www.weboftrust.info\/papers.html","author":"RWOT.","year":"2020","unstructured":"RWOT. 2020 . RWOT: White Papers. https:\/\/www.weboftrust.info\/papers.html RWOT. 2020. RWOT: White Papers. https:\/\/www.weboftrust.info\/papers.html"},{"key":"e_1_3_2_1_17_1","volume-title":"Sovrin: A Protocol and Token for Self- Sovereign Identity and Decentralized Trust. Technical Report January. https:\/\/sovrin.org\/wp-content\/uploads\/2018\/03\/Sovrin-Protocol-and-Token-White-Paper.pdf","author":"Foundation Sovrin","year":"2018","unstructured":"Sovrin Foundation . 2018 . Sovrin: A Protocol and Token for Self- Sovereign Identity and Decentralized Trust. Technical Report January. https:\/\/sovrin.org\/wp-content\/uploads\/2018\/03\/Sovrin-Protocol-and-Token-White-Paper.pdf Sovrin Foundation. 2018. Sovrin: A Protocol and Token for Self- Sovereign Identity and Decentralized Trust. Technical Report January. https:\/\/sovrin.org\/wp-content\/uploads\/2018\/03\/Sovrin-Protocol-and-Token-White-Paper.pdf"},{"key":"e_1_3_2_1_19_1","unstructured":"Orie Steele and Manu Sporny. 2021. DID Method Registry. https:\/\/w3c-ccg.github.io\/did-method-registry\/the-registry  Orie Steele and Manu Sporny. 2021. DID Method Registry. https:\/\/w3c-ccg.github.io\/did-method-registry\/the-registry"},{"key":"e_1_3_2_1_20_1","unstructured":"weboftrust.info. 2020. Rebooting the Web-Of-Trust. https:\/\/www.weboftrust.info\/  weboftrust.info. 2020. Rebooting the Web-Of-Trust. https:\/\/www.weboftrust.info\/"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25645-0_25"}],"event":{"name":"ICBTA 2020: 2020 the 3rd International Conference on Blockchain Technology and Applications","location":"Xi'an China","acronym":"ICBTA 2020"},"container-title":["2020 the 3rd International Conference on Blockchain Technology and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3446983.3446992","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3446983.3446992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:26Z","timestamp":1750195706000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3446983.3446992"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,14]]},"references-count":20,"alternative-id":["10.1145\/3446983.3446992","10.1145\/3446983"],"URL":"https:\/\/doi.org\/10.1145\/3446983.3446992","relation":{},"subject":[],"published":{"date-parts":[[2020,12,14]]},"assertion":[{"value":"2021-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}