{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:51:53Z","timestamp":1765889513021,"version":"build-2065373602"},"reference-count":67,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T00:00:00Z","timestamp":1752278400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"EU project NGI Trustchain","award":["No. 101093274"],"award-info":[{"award-number":["No. 101093274"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"abstract":"<jats:p>The growing influence of technology in the healthcare industry has led to the creation of innovative applications that improve convenience, accessibility, and diagnostic accuracy. However, health applications face significant challenges concerning user privacy and data security, as they handle extremely sensitive personal and medical information. Privacy-Enhancing Technologies (PETs), such as Privacy-Attribute-based Credentials, Differential Privacy, and Federated Learning, have emerged as crucial tools to tackle these challenges. Despite their potential, PETs are not widely utilized due to technical and implementation obstacles. This research introduces a comprehensive framework for protecting health applications from privacy and security threats, with a specific emphasis on gamified mental health apps designed to manage Attention Deficit Hyperactivity Disorder (ADHD) in children. Acknowledging the heightened sensitivity of mental health data, especially in applications for children, our framework prioritizes user-centered design and strong privacy measures. We suggest an identity management system based on blockchain technology to ensure secure and transparent credential management and incorporate Federated Learning to enable privacy-preserving AI-driven predictions. These advancements ensure compliance with data protection regulations, like GDPR, while meeting the needs of various stakeholders, including children, parents, educators, and healthcare professionals.<\/jats:p>","DOI":"10.3390\/jcp5030045","type":"journal-article","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T10:55:41Z","timestamp":1752490541000},"page":"45","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Triple-Shield Privacy in Healthcare: Federated Learning, p-ABCs, and Distributed Ledger Authentication"],"prefix":"10.3390","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-9206-9936","authenticated-orcid":false,"given":"Sofia","family":"Sakka","sequence":"first","affiliation":[{"name":"Department of Informatics & Telecommunications, University of Ioannina, 47100 Arta, Greece"}]},{"given":"Nikolaos","family":"Pavlidis","sequence":"additional","affiliation":[{"name":"DOTSOFT SA, 55535 Pilea, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1162-5490","authenticated-orcid":false,"given":"Vasiliki","family":"Liagkou","sequence":"additional","affiliation":[{"name":"Department of Informatics & Telecommunications, University of Ioannina, 47100 Arta, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0081-0540","authenticated-orcid":false,"given":"Ioannis","family":"Panges","sequence":"additional","affiliation":[{"name":"Department of Informatics & Telecommunications, University of Ioannina, 47100 Arta, Greece"}]},{"given":"Despina Elizabeth","family":"Filippidou","sequence":"additional","affiliation":[{"name":"DOTSOFT SA, 55535 Pilea, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2888-6515","authenticated-orcid":false,"given":"Chrysostomos","family":"Stylios","sequence":"additional","affiliation":[{"name":"Department of Informatics & Telecommunications, University of Ioannina, 47100 Arta, Greece"},{"name":"Industrial Systems Institute, ATHENA Research Center, 26504 Patras, Greece"}]},{"given":"Anastasios","family":"Manos","sequence":"additional","affiliation":[{"name":"DOTSOFT SA, 55535 Pilea, Greece"}]}],"member":"1968","published-online":{"date-parts":[[2025,7,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Huckvale, K., Prieto, J.T., Tilney, M., Benghozi, P.-J., and Car, J. (2015). Unaddressed Privacy Risks in Accredited Health and Wellness Apps: A Cross-Sectional Systematic Assessment. BMC Med., 13.","DOI":"10.1186\/s12916-015-0444-y"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"9390","DOI":"10.1109\/ACCESS.2018.2799522","article-title":"Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice","volume":"6","author":"Papageorgiou","year":"2018","journal-title":"IEEE Access"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1007\/s12553-024-00850-x","article-title":"Digital Transitions in Healthcare: The Need for Transdisciplinary Research to Overcome Barriers of Privacy Enhancing Technologies Uptake","volume":"14","author":"Timan","year":"2024","journal-title":"Health Technol."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1007\/s12525-022-00572-w","article-title":"It Is Not (Only) about Privacy: How Multi-Party Computation Redefines Control, Trust, and Risk in Data Sharing","volume":"32","author":"Agahari","year":"2022","journal-title":"Electron. Mark."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Wirth, F.N., Kussel, T., M\u00fcller, A., Hamacher, K., and Prasser, F. (2022). EasySMPC: A Simple but Powerful No-Code Tool for Practical Secure Multiparty Computation. BMC Bioinform., 23.","DOI":"10.1186\/s12859-022-05044-8"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/s10664-022-10236-0","article-title":"On the Privacy of Mental Health Apps: An Empirical Investigation and Its Implications for App Development","volume":"28","author":"Iwaya","year":"2023","journal-title":"Empir. Softw. Eng."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1007\/s10489-023-05095-1","article-title":"Exploring the Potential of Federated Learning in Mental Health Research: A Systematic Literature Review","volume":"54","author":"Khalil","year":"2024","journal-title":"Appl. Intell."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Mosaiyebzadeh, F., Pouriyeh, S., Parizi, R.M., Sheng, Q.Z., Han, M., Zhao, L., Sannino, G., Ranieri, C.M., Ueyama, J., and Batista, D.M. (2023). Privacy-Enhancing Technologies in Federated Learning for the Internet of Healthcare Things: A Survey. Electronics, 12.","DOI":"10.3390\/electronics12122703"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"(2025, June 18). Exploiting Security Issues in Human Activity Recognition Systems (HARSs). Available online: https:\/\/www.mdpi.com\/2078-2489\/14\/6\/315.","DOI":"10.3390\/info14060315"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., and Shmatikov, V. (2017, January 22\u201326). Membership Inference Attacks against Machine Learning Models. Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA.","DOI":"10.1109\/SP.2017.41"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"100974","DOI":"10.1016\/j.patter.2024.100974","article-title":"Privacy Preservation for Federated Learning in Health Care","volume":"5","author":"Pati","year":"2024","journal-title":"Patterns"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"814163","DOI":"10.3389\/fpubh.2022.814163","article-title":"Selecting Privacy-Enhancing Technologies for Managing Health Data Use","volume":"10","author":"Jordan","year":"2022","journal-title":"Front. Public Health"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2159","DOI":"10.1109\/JIOT.2018.2878658","article-title":"Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges","volume":"6","author":"Cha","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"110560","DOI":"10.1016\/j.dib.2024.110560","article-title":"Evaluation and Utilisation of Privacy Enhancing Technologies\u2014A Data Spaces Perspective","volume":"55","author":"Rahmian","year":"2024","journal-title":"Data Brief"},{"key":"ref_15","first-page":"44","article-title":"Attribute-Based Credentials for Privacy-Aware Smart Health Services in IoT-Based Smart Cities","volume":"51","author":"Solanas","year":"2018","journal-title":"Computer"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"41129","DOI":"10.1109\/ACCESS.2021.3064896","article-title":"PETchain: A Blockchain-Based Privacy Enhancing Technology","volume":"9","author":"Javed","year":"2021","journal-title":"IEEE Access"},{"key":"ref_17","unstructured":"(2025, June 05). U-Prove. Microsoft Res. Available online: https:\/\/www.microsoft.com\/en-us\/research\/project\/u-prove\/."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Kowalewski, S., and Roveri, M. (2010). A Formal Model of Identity Mixer. Proceedings of the Formal Methods for Industrial Critical Systems, Springer.","DOI":"10.1007\/978-3-642-15898-8"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"70","DOI":"10.2478\/popets-2021-0018","article-title":"EL PASSO: Efficient and Lightweight Privacy-Preserving Single Sign On","volume":"2021","author":"Zhang","year":"2021","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"ref_20","unstructured":"Camenisch, J., Fischer-H\u00fcbner, S., and Hansen, M. (2015). ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life. Proceedings of the Privacy and Identity Management for the Future Internet in the Age of Globalisation, Springer International Publishing."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1016\/j.future.2019.08.017","article-title":"ARIES: Evaluation of a Reliable and Privacy-Preserving European Identity Management Framework","volume":"102","author":"Bernabe","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1049\/trit.2018.0014","article-title":"Efficient Key Management Scheme for Health Blockchain","volume":"3","author":"Zhao","year":"2018","journal-title":"CAAI Trans. Intell. Technol."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/s10916-018-0994-6","article-title":"Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain","volume":"42","author":"Wang","year":"2018","journal-title":"J. Med. Syst."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/j.ins.2019.02.038","article-title":"Cloud-Assisted Secure eHealth Systems for Tamper-Proofing EHR via Blockchain","volume":"485","author":"Cao","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2146","DOI":"10.1109\/JBHI.2020.2969648","article-title":"Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain","volume":"24","author":"Yazdinejad","year":"2020","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Javed, I.T., Alharbi, F., Bellaj, B., Margaria, T., Crespi, N., and Qureshi, K.N. (2021). Health-ID: A Blockchain-Based Decentralized Identity Management for Remote Healthcare. Healthcare, 9.","DOI":"10.3390\/healthcare9060712"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Spanakis, E.G., Politis, I., Markakis, E., Papatsaroucha, D., Grammatopoulos, A.V., Bolgouras, V., Angelogianni, A., Xenakis, C., and Sakkalis, V. (2023, January 24). Towards Building a Self-Sovereign Identity Framework for Healthcare. Proceedings of the 2023 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC), Sydney, Australia.","DOI":"10.1109\/EMBC40787.2023.10340626"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Sabiri, K., Sousa, F., and Rocha, T. (2025). A Systematic Review of Privacy-Preserving Blockchain Applications in Healthcare. Multimed. Tools Appl., 1\u201356.","DOI":"10.1007\/s11042-024-20541-z"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Naik, N., and Jenkins, P. (October, January 13). Sovrin Network for Decentralized Digital Identity: Analysing a Self-Sovereign Identity System Based on Distributed Ledger Technology. Proceedings of the 2021 IEEE International Symposium on Systems Engineering (ISSE), Vienna, Austria.","DOI":"10.1109\/ISSE51541.2021.9582551"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Naik, N., and Jenkins, P. (2020, January 12). uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain. Proceedings of the 2020 IEEE International Symposium on Systems Engineering (ISSE), Vienna, Austria.","DOI":"10.1109\/ISSE49799.2020.9272223"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1443362","DOI":"10.3389\/fbloc.2024.1443362","article-title":"Self-Sovereign Identity on the Blockchain: Contextual Analysis and Quantification of SSI Principles Implementation","volume":"7","year":"2024","journal-title":"Front. Blockchain"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"102731","DOI":"10.1016\/j.jnca.2020.102731","article-title":"Blockchain-Based Identity Management Systems: A Review","volume":"166","author":"Liu","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_33","first-page":"10-30953","article-title":"Trust by Design: Evaluating Issues and Perceptions within Clinical Passporting","volume":"3","author":"Abramson","year":"2020","journal-title":"Blockchain Healthc. Today"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1186\/s13561-021-00337-9","article-title":"Health System Efficiency in OECD Countries: Dynamic Network DEA Approach","volume":"11","author":"Gavurova","year":"2021","journal-title":"Health Econ. Rev."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Mutambik, I., Lee, J., Almuqrin, A., and Alharbi, Z.H. (2024). Identifying the Barriers to Acceptance of Blockchain-Based Patient-Centric Data Management Systems in Healthcare. Healthcare, 12.","DOI":"10.3390\/healthcare12030345"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Chinnasamy, P., Albakri, A., Khan, M., Raja, A.A., Kiran, A., and Babu, J.C. (2023). Smart Contract-Enabled Secure Sharing of Health Data for a Mobile Cloud-Based E-Health System. Appl. Sci., 13.","DOI":"10.3390\/app13063970"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/bs.adcom.2018.03.006","article-title":"Blockchain Technology Use Cases in Healthcare","volume":"Volume 111","author":"Zhang","year":"2018","journal-title":"Advances in Computers"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Kaushal, R.K., Kumar, N., Panda, S.N., and Kukreja, V. (2021, January 3\u20134). Immutable Smart Contracts on Blockchain Technology: Its Benefits and Barriers. Proceedings of the 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India.","DOI":"10.1109\/ICRITO51393.2021.9596538"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1016\/j.future.2019.12.019","article-title":"An Overview on Smart Contracts: Challenges, Advances and Platforms","volume":"105","author":"Zheng","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Khatoon, A. (2020). A Blockchain-Based Smart Contract System for Healthcare Management. Electronics, 9.","DOI":"10.3390\/electronics9010094"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Linoy, S., Stakhanova, N., and Matyukhina, A. (2019, January 21\u201325). Exploring Ethereum\u2019s Blockchain Anonymity Using Smart Contract Code Attribution. Proceedings of the 2019 15th International Conference on Network and Service Management (CNSM), Halifax, NS, Canada.","DOI":"10.23919\/CNSM46954.2019.9012681"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1109\/TSMC.2019.2895123","article-title":"Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends","volume":"49","author":"Wang","year":"2019","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Taherdoost, H. (2023). Privacy and Security of Blockchain in Healthcare: Applications, Challenges, and Future Perspectives. Sci, 5.","DOI":"10.3390\/sci5040041"},{"key":"ref_44","unstructured":"McMahan, H.B., Moore, E., Ramage, D., Hampson, S., and Arcas, B.A. (2016). Communication-Efficient Learning of Deep Networks from Decentralized Data. arXiv."},{"key":"ref_45","unstructured":"Pavlidis, N., Perifanis, V., Briola, E., Nikolaidis, C.-C., Katsiri, E., Efraimidis, P.S., and Filippidou, D.E. (2024). Federated Anomaly Detection for Early-Stage Diagnosis of Autism Spectrum Disorders Using Serious Game Data 2024. arXiv."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Briola, E., Nikolaidis, C.C., Perifanis, V., Pavlidis, N., and Efraimidis, P. (2024, January 5). A Federated Explainable AI Model for Breast Cancer Classification. Proceedings of the European Interdisciplinary Cybersecurity Conference, Xanthi, Greece.","DOI":"10.1145\/3655693.3660255"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"2864","DOI":"10.1109\/TNSE.2022.3185327","article-title":"Homomorphic Encryption-Based Privacy-Preserving Federated Learning in IoT-Enabled Healthcare System","volume":"10","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_48","unstructured":"Sachin, D.N., Annappa, B., and Ambesenge, S. (2023, January 6). FedRH: Federated Learning Based Remote Healthcare. Proceedings of the 2023 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), New Raipur, India."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Sandhu, S.S., Gorji, H.T., Tavakolian, P., Tavakolian, K., and Akhbardeh, A. (2023). Medical Imaging Applications of Federated Learning. Diagnostics, 13.","DOI":"10.3390\/diagnostics13193140"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"14418","DOI":"10.1109\/JIOT.2023.3263598","article-title":"Blockchain Meets Federated Learning in Healthcare: A Systematic Review With Challenges and Opportunities","volume":"10","author":"Myrzashova","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/j.future.2023.02.021","article-title":"Review on Security of Federated Learning and Its Application in Healthcare","volume":"144","author":"Li","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_52","unstructured":"Podschwadt, R., Takabi, D., and Hu, P. (2025, June 20). SoK: Privacy-Preserving Deep Learning with Homomorphic Encryption. Available online: https:\/\/arxiv.org\/abs\/2112.12855v2."},{"key":"ref_53","unstructured":"Matias, C., Ivaki, N., and Moraes, R. Exploring the Impact of Homomorphic Encryption on the Performance of Machine Learning Algorithms. Proceedings of the Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"103497","DOI":"10.1016\/j.media.2025.103497","article-title":"From Challenges and Pitfalls to Recommendations and Opportunities: Implementing Federated Learning in Healthcare","volume":"101","author":"Li","year":"2025","journal-title":"Med. Image Anal."},{"key":"ref_55","first-page":"1","article-title":"FedSuper: A Byzantine-Robust Federated Learning Under Supervision","volume":"20","author":"Zhao","year":"2024","journal-title":"ACM Trans Sen Netw"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"110658","DOI":"10.1016\/j.knosys.2023.110658","article-title":"Federated Learning for Secure IoMT-Applications in Smart Healthcare Systems: A Comprehensive Review","volume":"274","author":"Rani","year":"2023","journal-title":"Knowl.-Based Syst."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep Learning","volume":"521","author":"LeCun","year":"2015","journal-title":"Nature"},{"key":"ref_58","unstructured":"(2025, June 13). QbTest: Improve ADHD Diagnosis & Treatment. Available online: https:\/\/www.qbtech.com\/adhd-tests\/qbtest\/."},{"key":"ref_59","unstructured":"(2025, June 13). Cogmed. Available online: https:\/\/www.cogmed.com\/."},{"key":"ref_60","unstructured":"(2025, June 13). ADDitude\u2014ADD & ADHD Symptom Tests, Signs, Treatment, Support. Available online: https:\/\/www.additudemag.com\/?srsltid=AfmBOoqdAy-HDxb7NI1lad6MOMUBd6Nxdgq9H6UU5wt3ZTHUAd7x_f0I."},{"key":"ref_61","unstructured":"(2025, June 13). ADHD Assessment Forms for Adults | CADDRA 2024. Available online: https:\/\/www.caddra.ca\/public-information\/adults\/forms\/."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Alhossein, A., Abaoud, A.A., Becker, D., Aldabas, R., Bakhiet, S.F., Al Jaffal, M., Alsufyani, M., Abdu Elrahim, N.M., and Alzrayer, N. (2022). Psychometric Properties of ADHD Rating Scale\u20145 for Children and Adolescents in Sudan\u2014School Version. Front. Psychol., 13.","DOI":"10.3389\/fpsyg.2022.883578"},{"key":"ref_63","unstructured":"Sigolo, R. (2025, June 13). My ADHD. Available online: https:\/\/myadhd.app\/."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Sakka, S., Liagkou, V., and Stylios, C. (2024, January 19). A Blockchain Identity Privacy Management Framework for a Healthcare Application. Proceedings of the 2024 IEEE International Conference on Blockchain (Blockchain), Copenhagen, Denmark.","DOI":"10.1109\/Blockchain62396.2024.00088"},{"key":"ref_65","unstructured":"Friedewald, M., Krenn, S., Schiering, I., and Schiffner, S. Privacy-Preserving Identity Management and Applications to Academic Degree Verification. Proceedings of the Privacy and Identity Management. Between Data Protection and Security."},{"key":"ref_66","unstructured":"Pfitzmann, B. An Efficient System for Non-Transferable Anonymous Credentials with Optional Anonymity Revocation. Proceedings of the Advances in Cryptology\u2014EUROCRYPT 2001."},{"key":"ref_67","first-page":"25","article-title":"Concepts and Languages for Privacy-Preserving Attribute-Based Authentication","volume":"19","author":"Camenisch","year":"2014","journal-title":"J. Inf. Secur. Appl."}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/5\/3\/45\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:09:10Z","timestamp":1760033350000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/5\/3\/45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,12]]},"references-count":67,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,9]]}},"alternative-id":["jcp5030045"],"URL":"https:\/\/doi.org\/10.3390\/jcp5030045","relation":{},"ISSN":["2624-800X"],"issn-type":[{"type":"electronic","value":"2624-800X"}],"subject":[],"published":{"date-parts":[[2025,7,12]]}}}