{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:24:31Z","timestamp":1740173071920,"version":"3.37.3"},"reference-count":49,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"2","license":[{"start":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T00:00:00Z","timestamp":1678752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T00:00:00Z","timestamp":1678752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Johannes Kepler University Linz"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2023,4]]},"abstract":"<jats:title>Zusammenfassung<\/jats:title><jats:p>Anforderungen an Datenschutz und Informationssicherheit, aber auch an Datenaktualit\u00e4t und Vereinfachung bewirken einen kontinuierlichen Trend hin zu plattform\u00fcbergreifenden ID-Systemen f\u00fcr die digitale Welt. Das sind typischerweise f\u00f6derierte Single-Sign-On-L\u00f6sungen gro\u00dfer internationaler Konzerne wie Apple, Facebook und Google. Dieser Beitrag beleuchtet die Frage, wie ein dezentrales, offenes, globales \u00d6kosystem nach dem Vorbild des Single-Sign-On f\u00fcr die digitale, biometrische Identifikation in der physischen Welt aussehen k\u00f6nnte. Im Vordergrund steht dabei die implizite Interaktion mit vorhandener Sensorik, mit der Vision, dass Individuen in der Zukunft weder Plastikkarten noch mobile Ausweise am Smartphone mit sich f\u00fchren m\u00fcssen, sondern ihre Berechtigung f\u00fcr die Nutzung von Diensten rein anhand ihrer biometrischen Merkmale nachweisen k\u00f6nnen. W\u00e4hrend diese Vision bereits jetzt problemlos durch Systeme mit einer zentralisierten Datenbank mit umfangreichen biometrischen Daten aller B\u00fcrger*innen m\u00f6glich ist, w\u00e4re ein Ansatz mit selbstverwalteten, dezentralen digitalen Identit\u00e4ten erstrebenswert, bei dem die Nutzer*in in den Mittelpunkt der Kontrolle \u00fcber ihre eigene digitale Identit\u00e4t gestellt wird und die eigene digitale Identit\u00e4t an beliebigen Orten hosten kann. Anhand einer Analyse des Zielkonflikts zwischen umfangreichem Privatsph\u00e4reschutz und Praktikabilit\u00e4t, und eines Vergleichs der Abw\u00e4gung dieser Ziele mit bestehenden Ans\u00e4tzen f\u00fcr digitale Identit\u00e4ten wird ein Konzept f\u00fcr ein dezentrales, offenes, globales \u00d6kosystem zur privaten, digitalen Authentifizierung in der physischen Welt abgeleitet.<\/jats:p>","DOI":"10.1365\/s40702-023-00949-1","type":"journal-article","created":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T11:03:06Z","timestamp":1679569386000},"page":"283-307","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Digitale Identit\u00e4ten in der physischen Welt: Eine Abw\u00e4gung von Privatsph\u00e4reschutz und Praktikabilit\u00e4t","Digital Identities in the Physical World: A\u00a0Trade-off Between Privacy and Practicability"],"prefix":"10.1365","volume":"60","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4675-0539","authenticated-orcid":false,"given":"Michael","family":"Roland","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0132-6817","authenticated-orcid":false,"given":"Tobias","family":"H\u00f6ller","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1566-4646","authenticated-orcid":false,"given":"Ren\u00e9","family":"Mayrhofer","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2023,3,14]]},"reference":[{"key":"949_CR3","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/1102486.1102492","volume-title":"DIM \u201905: Proceedings of the 2005 Workshop on Digital Identity Management","author":"GJ Ahn","year":"2005","unstructured":"Ahn\u00a0GJ, Lam\u00a0J (2005) Managing Privacy Preferences for Federated Identity Management. In: DIM \u201905: Proceedings of the 2005 Workshop on Digital Identity Management, ACM, S 28\u201336 https:\/\/doi.org\/10.1145\/1102486.1102492"},{"key":"949_CR4","series-title":"In","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1109\/ARES.2011.85","volume-title":"An Identity-Centric Internet: Identity in the Cloud, Identity as a Service and Other Delights","author":"M Ates","year":"2011","unstructured":"Ates\u00a0M, Ravet\u00a0S, Ahmat\u00a0AM, Fayolle\u00a0J (2011) An Identity-Centric Internet: Identity in the Cloud, Identity as a Service and Other Delights. In: 2011 Sixth International Conference on Availability, Reliability and Security, IEEE, S 555\u2013560 https:\/\/doi.org\/10.1109\/ARES.2011.85"},{"volume-title":"Administration on the Net: The ABC guide of eGovernment in Austria","year":"2014","key":"949_CR5","unstructured":"Austrian Federal Chancellery, Federal Platform Digital Austria (Hrsg) (2014) Administration on the Net: The ABC guide of eGovernment in Austria. Kny & Partner, Vienna"},{"key":"949_CR1","unstructured":"A\u2011SIT Plus GmbH (2021a) ID Austria: Technisches Whitepaper f\u00fcr Service-Owner. https:\/\/eid.egiz.gv.at\/wp-content\/uploads\/2021\/10\/ID-Austria-Technisches-Whitepaper-fuer-Service-Owner-1.pdf. Zugegriffen: 21. Dezember 2022"},{"key":"949_CR2","unstructured":"A\u2011SIT Plus GmbH (2021b) ID Austria: Technisches Whitepaper f\u00fcr Endnutzer*innen. https:\/\/eid.egiz.gv.at\/wp-content\/uploads\/2021\/12\/ID-Austria-Whitepaper-fuer-EndanwenderInnen.docx.pdf. Zugegriffen: 21. Dezember 2022"},{"key":"949_CR6","doi-asserted-by":"publisher","first-page":"167653","DOI":"10.1109\/ACCESS.2019.2953499","volume":"7","author":"BR Barricelli","year":"2019","unstructured":"Barricelli\u00a0BR, Casiraghi\u00a0E, Fogli\u00a0D (2019) A\u00a0Survey on Digital Twin: Definitions, Characteristics, Applications, and Design Implications. IEEE Access 7:167653\u2013167671. https:\/\/doi.org\/10.1109\/ACCESS.2019.2953499","journal-title":"IEEE Access"},{"key":"949_CR7","unstructured":"BGBl\u00a0I Nr 190\/1999 (1999) Bundesgesetz \u00fcber elektronische Signaturen (Signaturgesetz \u2013 SigG). BGBl. f\u00fcr die Republik \u00d6sterreich, Teil\u00a0I, Nr. 190\/1999, S 1451\u20131462"},{"key":"949_CR8","unstructured":"Bonnette\u00a0R (2017) Biometrics in Movies Sci-Fi Security. The Identity & Access Management Blog. https:\/\/www.avatier.com\/blog\/biometrics-in-sci-fi-movies\/. Zugegriffen: 14. September 2022"},{"key":"949_CR9","unstructured":"Bundesministerium f\u00fcr Finanzen (2022) Informationen zu Stufen der ID Austria und zur Pilotphase. https:\/\/www.oesterreich.gv.at\/id-austria\/pilotbetrieb.html#digitale-ausweise. Zugegriffen: 14. September 2022"},{"issue":"1","key":"949_CR10","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jisa.2014.03.004","volume":"19","author":"J Camenisch","year":"2014","unstructured":"Camenisch\u00a0J, Dubovitskaya\u00a0M, Enderlein\u00a0RR, Lehmann\u00a0A, Neven\u00a0G, Paquin\u00a0C, Preiss\u00a0FS (2014) Concepts and languages for privacy-preserving attribute-based authentication. J\u00a0Inf Secur Appl 19(1):25\u201344. https:\/\/doi.org\/10.1016\/j.jisa.2014.03.004","journal-title":"J\u00a0Inf Secur Appl"},{"key":"949_CR11","series-title":"IFIP advances in information and communication technology (IFIPAICT)","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/0-387-24486-7_2","volume-title":"Communications and multimedia security","author":"H Chivers","year":"2005","unstructured":"Chivers\u00a0H (2005) Personal Attributes and Privacy: How to ensure that private attribute management is not subverted by datamining. In: Chadwick\u00a0D, Preneel\u00a0B (Hrsg) Communications and multimedia security. IFIP advances in information and communication technology (IFIPAICT), Bd. 175. Springer, Boston, MA, S 17\u201329 https:\/\/doi.org\/10.1007\/0-387-24486-7_2"},{"key":"949_CR12","doi-asserted-by":"publisher","DOI":"10.2824\/38623","volume-title":"Privacy and Data Protection by Design \u2013 from policy to engineering","author":"G Danezis","year":"2014","unstructured":"Danezis\u00a0G, Domingo-Ferrer\u00a0J, Hansen\u00a0M, Hoepman\u00a0JH, Le M\u00e9tayer\u00a0D, Tirtea\u00a0R, Schiffner\u00a0S (2014) Privacy and Data Protection by Design \u2013 from policy to engineering. European Union Agency for Network and Information Security (ENISA) https:\/\/doi.org\/10.2824\/38623"},{"key":"#cr-split#-949_CR13.1","unstructured":"Europ\u00e4ische Kommission (2021) Vorschlag f\u00fcr eine Verordnung des Europ\u00e4ischen Parlaments und des Rates zur \u00c4nderung der Verordnung"},{"key":"#cr-split#-949_CR13.2","unstructured":"(EU) Nr. 910\/2014 im Hinblick auf die Schaffung eines Rahmens f\u00fcr eine europ\u00e4ische digitale Identit\u00e4t. COM(2021) 218 final. https:\/\/eur-lex.europa.eu\/legal-content\/DE\/TXT\/?uri=CELEX:52021PC0281. Zugegriffen: 14. September 2022"},{"key":"949_CR14","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-319-38756-7_4","volume-title":"Transdisciplinary Perspectives on Complex Systems: New Findings and Approaches","author":"M Grieves","year":"2017","unstructured":"Grieves\u00a0M, Vickers\u00a0J (2017) Digital Twin: Mitigating Unpredictable, Undesirable Emergent Behavior in Complex Systems. In: Kahlen\u00a0FJ, Flumerfelt\u00a0S, Alves\u00a0A (Hrsg) Transdisciplinary Perspectives on Complex Systems: New Findings and Approaches. Springer, Cham, S 85\u2013113 https:\/\/doi.org\/10.1007\/978-3-319-38756-7_4"},{"key":"949_CR15","series-title":"IFIP advances in information and communication technology (IFIPAICT)","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/978-3-642-37282-7_2","volume-title":"Policies and research in identity management","author":"M Hansen","year":"2013","unstructured":"Hansen\u00a0M (2013) Data Protection by Default in Identity-Related Applications. In: Fischer-H\u00fcbner\u00a0S, de Leeuw\u00a0E, Mitchell\u00a0C (Hrsg) Policies and research in identity management. IFIP advances in information and communication technology (IFIPAICT), Bd. 396. Springer, Berlin, Heidelberg, S 4\u201317 https:\/\/doi.org\/10.1007\/978-3-642-37282-7_2"},{"issue":"2","key":"949_CR17","doi-asserted-by":"publisher","first-page":"141","DOI":"10.13052\/jcsm2245-1439.1122","volume":"11","author":"T H\u00f6ller","year":"2022","unstructured":"H\u00f6ller\u00a0T, Roland\u00a0M, Mayrhofer\u00a0R (2022) Evaluating Dynamic Tor Onion Services for Privacy Preserving Distributed Digital Identity Systems. J\u00a0Cyber Secur Mobil 11(2):141\u2013164. https:\/\/doi.org\/10.13052\/jcsm2245-1439.1122","journal-title":"J\u00a0Cyber Secur Mobil"},{"key":"949_CR18","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167303","volume-title":"Proceedings of the ACM SAC Conference (SAC \u201918), ACM","author":"M H\u00f6lzl","year":"2018","unstructured":"H\u00f6lzl\u00a0M, Roland\u00a0M, Mir\u00a0O, Mayrhofer\u00a0R (2018) Bridging the Gap in Privacy-Preserving Revocation: Practical and Scalable Revocation of Mobile eIDs. In: Proceedings of the ACM SAC Conference (SAC \u201918), ACM, S 1601\u20131609 https:\/\/doi.org\/10.1145\/3167132.3167303"},{"key":"949_CR16","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-162","volume-title":"Guide to Attribute Based Access Control (ABAC) Definition and Considerations","author":"V Hu","year":"2014","unstructured":"Hu\u00a0V, Ferraiolo\u00a0D, Kuhn\u00a0R, Schnitzer\u00a0A, Sandlin\u00a0K, Miller\u00a0R, Scarfone\u00a0K (2014) Guide to Attribute Based Access Control (ABAC) Definition and Considerations. https:\/\/doi.org\/10.6028\/NIST.SP.800-162"},{"key":"949_CR19","unstructured":"ICAO Doc 9303 (2021) Machine Readable Travel Documents, Part 1 \u2014 Introduction, 8.\u00a0Aufl."},{"key":"949_CR20","unstructured":"ISO\/IEC 18013\u20112:2020 (2020) Personal identification \u2014 ISO-compliant driving licence \u2014 Part 2: Machine-readable technologies"},{"key":"949_CR21","unstructured":"ISO\/IEC 18013\u20115:2021 (2021) Personal identification \u2014 ISO-compliant driving licence \u2014 Part 5: Mobile driving licence (mDL) application"},{"key":"949_CR22","unstructured":"ISO\/IEC FDIS 23220\u20111 (2022) Cards and security devices for personal identification \u2014 Building blocks for identity management via mobile devices \u2014 Part 1: Generic system architectures of mobile eID systems"},{"key":"949_CR23","unstructured":"J\u00f8sang\u00a0A, Pope\u00a0S (2005) User Centric Identity Management. In: Proceedings of AusCERT Conference 2005. https:\/\/folk.uio.no\/josang\/papers\/JP2005-AusCERT.pdf. Zugegriffen: 14. September 2022"},{"key":"949_CR24","unstructured":"Khaira\u00a0R (2018) Rs 500, 10 minutes, and you have access to billion Aadhaar details. The Tribune. https:\/\/www.tribuneindia.com\/news\/archive\/nation\/rs-500-10-minutes-and-you-have-access-to-billion-aadhaar-details-523361. Zugegriffen: 14. September 2022"},{"key":"949_CR25","series-title":"Lecture notes in computer science (LNCS)","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-319-22479-4_21","volume-title":"Electronic government","author":"A Khatchatourov","year":"2015","unstructured":"Khatchatourov\u00a0A, Laurent\u00a0M, Levallois-Barth\u00a0C (2015) Privacy in Digital Identity Systems: Models, Assessment, and User Adoption. In: Tambouris\u00a0E, Janssen\u00a0M, Scholl\u00a0HJ, Wimmer\u00a0MA, Tarabanis\u00a0K, Gasc\u00f3\u00a0M, Klievink\u00a0B, Lindgren\u00a0I, Parycek\u00a0P (Hrsg) Electronic government. Lecture notes in computer science (LNCS), Bd. 9248. Springer, Cham, S 273\u2013290 https:\/\/doi.org\/10.1007\/978-3-319-22479-4_21"},{"key":"949_CR26","volume-title":"The ABCs of ABCs \u2013 An Analysis of Attribute-Based Credentials in the Light of Data Protection, Privacy and Identity. In: 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2014)","author":"M Koning","year":"2014","unstructured":"Koning\u00a0M, Korenhof\u00a0P, Alp\u00e1r\u00a0G, Jaap-Henk\u00a0H (2014) The ABCs of ABCs \u2013 An Analysis of Attribute-Based Credentials in the Light of Data Protection, Privacy and Identity. In: 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2014). https:\/\/www.petsymposium.org\/2014\/papers\/Koning.pdf. Zugegriffen: 14. September 2022"},{"key":"949_CR27","unstructured":"Koppen\u00a0G (2022) DoS attacks \u2013 status update. Message on tor-relays mailing list. https:\/\/lists.torproject.org\/pipermail\/tor-relays\/2022-October\/020858.html. Zugegriffen: 21. Dezember 2022"},{"key":"949_CR28","doi-asserted-by":"publisher","first-page":"3403","DOI":"10.1007\/s10462-019-09767-8","volume":"53","author":"KN Manisha","year":"2020","unstructured":"Manisha, Kumar\u00a0N (2020) Cancelable Biometrics: a\u00a0comprehensive survey. Artif Intell Rev 53:3403\u20133446. https:\/\/doi.org\/10.1007\/s10462-019-09767-8","journal-title":"Artif Intell Rev"},{"key":"949_CR29","unstructured":"Mayrhofer\u00a0R, Roland\u00a0M, H\u00f6ller\u00a0T (2020) Poster: Towards an Architecture for Private Digital Authentication in the Physical World. In: Network and Distributed System Security Symposium (NDSS Symposium 2020), Posters"},{"key":"949_CR30","unstructured":"ONCE (2022) Das Projekt: Hoheitliche Daten und Self Sovereign Identity. Once \u2013 Identity. https:\/\/once-identity.de\/das-projekt\/. Zugegriffen: 21. Dezember 2022"},{"issue":"6","key":"949_CR31","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1177\/146144804042523","volume":"6","author":"DJ Phillips","year":"2004","unstructured":"Phillips\u00a0DJ (2004) Privacy policy and PETs: The influence of policy regimes on the development and social implications of privacy enhancing technologies. New Media Soc 6(6):691\u2013706. https:\/\/doi.org\/10.1177\/146144804042523","journal-title":"New Media Soc"},{"issue":"1","key":"949_CR32","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MSP.2011.148","volume":"10","author":"A Poller","year":"2012","unstructured":"Poller\u00a0A, Waldmann\u00a0U, Vowe\u00a0S, Turpe\u00a0S (2012) Electronic Identity Cards for User Authentication\u2014Promise and Practice. IEEE Secur Privacy 10(1):46\u201354. https:\/\/doi.org\/10.1109\/MSP.2011.148","journal-title":"IEEE Secur Privacy"},{"key":"949_CR33","unstructured":"Qian\u00a0I, Xiao\u00a0M, Mozur\u00a0P, Cardia\u00a0A (2022) Four takeaways from a\u00a0times investigation into China\u2019s expanding surveillance state. The New York Times. https:\/\/www.nytimes.com\/2022\/06\/21\/world\/asia\/china-surveillance-investigation.html. Zugegriffen: 21. Dezember 2022"},{"key":"949_CR34","unstructured":"Rajeshkumar\u00a0R (2021) Digital travel credentials. https:\/\/www.icao.int\/Meetings\/TRIP-Symposium-2021\/PublishingImages\/Pages\/Presentations\/Digital%20Travel%20Credential%20%28DTC%29%20Policy%20and%20Guiding%20Principles.pdf. Zugegriffen: 14. September 2022"},{"key":"949_CR35","unstructured":"Richtlinie 1999\/93\/EG (2000) Richtlinie 1999\/93\/EG des Europ\u00e4ischen Parlaments und des Rates vom 13. Dezember 1999 \u00fcber gemeinschaftliche Rahmenbedingungen f\u00fcr elektronische Signaturen. Amtsblatt der Europ\u00e4ischen Gemeinschaften, Nr.\u00a0L\u00a013 vom 19.01.2000, S.\u00a012\u201320. https:\/\/eur-lex.europa.eu\/legal-content\/DE\/ALL\/?uri=CELEX:31999L0093. Zugegriffen: 14. September 2022"},{"key":"949_CR36","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-642-04846-3_14","volume-title":"Advances in information and computer security. Lecture notes in computer science (LNCS)","author":"T Sakashita","year":"2009","unstructured":"Sakashita\u00a0T, Shibata\u00a0Y, Yamamoto\u00a0T, Takahashi\u00a0K, Ogata\u00a0W, Kikuchi\u00a0H, Nishigaki\u00a0M (2009) A\u00a0Proposal of Efficient Remote Biometric Authentication Protocol. In: Takagi\u00a0T, Mambo\u00a0M (Hrsg) Advances in information and computer security. Lecture notes in computer science (LNCS), Bd. 5824. Springer, Berlin, Heidelberg, S\u00a0212\u2013227 https:\/\/doi.org\/10.1007\/978-3-642-04846-3_14"},{"key":"949_CR37","doi-asserted-by":"crossref","unstructured":"Schaber\u00a0F, Strau\u00df S, Peissl\u00a0W (2020) Der K\u00f6rper als Schl\u00fcssel? Biometrische Methoden f\u00fcr Konsument*innen. https:\/\/www.arbeiterkammer.at\/service\/studien\/konsument\/Der_Koerper_als_Schluessel.html. Zugegriffen: 14. September 2022","DOI":"10.1553\/ITA-pb-2020-03"},{"key":"949_CR38","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.13","volume-title":"First International Conference on Availability, Reliability and Security (ARES\u201906), IEEE","author":"C Schlager","year":"2006","unstructured":"Schlager\u00a0C, Nowey\u00a0T, Montenegro\u00a0JA (2006) A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce. In: First International Conference on Availability, Reliability and Security (ARES\u201906), IEEE. https:\/\/doi.org\/10.1109\/ARES.2006.13"},{"key":"949_CR39","unstructured":"Sporny\u00a0M, Longley\u00a0D, Chadwick\u00a0D (2022a) Verifiable Credentials Data Model v1.1. https:\/\/www.w3.org\/TR\/vc-data-model. Zugegriffen: 21. Dezember 2022"},{"key":"949_CR40","unstructured":"Sporny\u00a0M, Longley\u00a0D, Sabadello\u00a0M, Reed\u00a0D, Steele\u00a0O, Allen\u00a0C (2022b) Decentralized Identifiers (DIDs) v1.0. https:\/\/www.w3.org\/TR\/did-core. Zugegriffen: 21. Dezember 2022"},{"key":"949_CR41","unstructured":"Tor Project (2022) How to circumvent the Great Firewall and connect to Tor from China? Tor project support. https:\/\/support.torproject.org\/censorship\/connecting-from-china\/. Zugegriffen: 21. Dezember 2022"},{"issue":"1","key":"949_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/OJCS.2021.3138332","volume":"3","author":"QN Tran","year":"2022","unstructured":"Tran\u00a0QN, Turnbull\u00a0BP, Wang\u00a0M, Hu\u00a0J (2022) A Privacy-Preserving Biometric Authentication System with Binary Classification in a Zero Knowledge Proof Protocol. IEEE Open J Comput Soc 3(1):1\u201310. https:\/\/doi.org\/10.1109\/OJCS.2021.3138332","journal-title":"IEEE Open J Comput Soc"},{"key":"949_CR43","unstructured":"Unique Identification Authority of India (2022) Authentication Ecosystem: Operational Model. https:\/\/www.uidai.gov.in\/en\/ecosystem\/authentication-ecosystem\/operation-model.html. Zugegriffen: 14. September 2022"},{"key":"949_CR44","unstructured":"Verordnung (EU) 2016\/679 (2016) Verordnung (EU) 2016\/679 des Europ\u00e4ischen Parlaments und des Rates vom 27. April 2016 zum Schutz nat\u00fcrlicher Personen bei der Verarbeitung personenbezogener Daten, zum freien Datenverkehr und zur Aufhebung der Richtlinie 95\/46\/EG (Datenschutz-Grundverordnung). Amtsblatt der Europ\u00e4ischen Union, Nr. L 119 vom 04.05.2016, S. 1\u201388, https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"949_CR45","unstructured":"Verordnung (EU) Nr. 910\/2014 (2014) Verordnung (EU) Nr. 910\/2014 des Europ\u00e4ischen Parlaments und des Rates vom 23. Juli 2014 \u00fcber elektronische Identifizierung und Vertrauensdienste f\u00fcr elektronische Transaktionen im Binnenmarkt und zur Aufhebung der Richtlinie 1999\/93\/EG. Amtsblatt der Europ\u00e4ischen Union, Nr.\u00a0L\u00a0257 vom 28.08.2014, S.\u00a073\u2013114, https:\/\/eur-lex.europa.eu\/legal-content\/DE\/ALL\/?uri=celex:32014R0910"},{"key":"949_CR46","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2021.626726","author":"PJ Windley","year":"2021","unstructured":"Windley\u00a0PJ (2021) Sovrin: An Identity Metasystem for Self-Sovereign Identity. Front Blockchain. https:\/\/doi.org\/10.3389\/fbloc.2021.626726","journal-title":"Front Blockchain"},{"key":"949_CR47","series-title":"In","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/DICTA51227.2020.9363426","volume-title":"Secure Fingerprint Authentication with Homomorphic Encryption","author":"W Yang","year":"2020","unstructured":"Yang\u00a0W, Wang\u00a0S, Yu\u00a0K, Kang\u00a0JJ, Johnstone\u00a0MN (2020) Secure Fingerprint Authentication with Homomorphic Encryption. In: 2020 Digital Image Computing: Techniques and Applications (DICTA), IEEE, S 1\u20136 https:\/\/doi.org\/10.1109\/DICTA51227.2020.9363426"},{"key":"949_CR48","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-31668-5_19","volume-title":"Privacy and identity management for life. IFIP advances in information and communication technology (IFIPAICT)","author":"H Zwingelberg","year":"2011","unstructured":"Zwingelberg\u00a0H, Hansen\u00a0M (2011) Privacy Protection Goals and Their Implications for eID Systems. In: Camenisch\u00a0J, Crispo\u00a0B, Fischer-H\u00fcbner\u00a0S, Leenes\u00a0R, Russello\u00a0G (Hrsg) Privacy and identity management for life. IFIP advances in information and communication technology (IFIPAICT), Bd. 375. Springer, Berlin, Heidelberg, S 245\u2013260 https:\/\/doi.org\/10.1007\/978-3-642-31668-5_19"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-023-00949-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1365\/s40702-023-00949-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-023-00949-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T11:07:54Z","timestamp":1679569674000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1365\/s40702-023-00949-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,14]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["949"],"URL":"https:\/\/doi.org\/10.1365\/s40702-023-00949-1","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"type":"print","value":"1436-3011"},{"type":"electronic","value":"2198-2775"}],"subject":[],"published":{"date-parts":[[2023,3,14]]},"assertion":[{"value":"18 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}