{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:00:23Z","timestamp":1730199623760,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,24]]},"DOI":"10.1109\/bcca58897.2023.10338923","type":"proceedings-article","created":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T19:51:48Z","timestamp":1702324308000},"page":"266-273","source":"Crossref","is-referenced-by-count":0,"title":["Verifiable Credentials with Privacy-Preserving Tamper-Evident Revocation Mechanism"],"prefix":"10.1109","author":[{"given":"Li","family":"Xu","sequence":"first","affiliation":[{"name":"Delft University of Technology,Cyber Security Group,Delft,the Netherlands"}]},{"given":"Tianyu","family":"Li","sequence":"additional","affiliation":[{"name":"Delft University of Technology,Cyber Security Group,Delft,the Netherlands"}]},{"given":"Zekeriya","family":"Erkin","sequence":"additional","affiliation":[{"name":"Delft University of Technology,Cyber Security Group,Delft,the Netherlands"}]}],"member":"263","reference":[{"journal-title":"Verifiable credentials data model v1.1","year":"2021","author":"Sporny","key":"ref1"},{"volume-title":"Eus passport fraud \u2018epidemic\u2019","year":"2017","author":"Paravicini","key":"ref2"},{"key":"ref3","article-title":"The 9\/11 commission report: Final report of the national commission on terrorist attacks upon the United States","volume-title":"Government Printing Office","volume":"3","author":"Kean","year":"2004"},{"volume-title":"Openattestation","key":"ref4"},{"journal-title":"veramo","key":"ref5"},{"volume-title":"Sorvin","key":"ref6"},{"volume-title":"Irma","key":"ref7"},{"volume-title":"Gravity","key":"ref8"},{"volume-title":"verifiable-credentials-java","key":"ref9"},{"article-title":"Modular design of secure yet practical cryptographic protocols","volume-title":"Ph. D. Thesis, CWI and University of Amsterdam, 1996","author":"Cramer","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_12"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2007.12.010"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45572-3_1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36413-7_20"},{"volume-title":"Why the verifiable credentials community should converge on bbs+","year":"2021","author":"Zundel","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0169-2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.13"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_27"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CSF51468.2021.00033"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64322-8_19"},{"volume-title":"Blwasp","key":"ref23"},{"volume-title":"Spruce","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.001.1900020"},{"volume-title":"vc-js","key":"ref26"},{"volume-title":"uport","key":"ref27"},{"issue":"2016","key":"ref28","article-title":"The inevitable rise of self-sovereign identity","volume":"29","author":"Tobin","year":"2016","journal-title":"The Sovrin Foundation"},{"journal-title":"The path to self-sovereign identity","year":"2016","author":"Allen","key":"ref29"},{"volume-title":"Hyperledger indy","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052252"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052225"},{"volume-title":"Hyperledger iroha","key":"ref34"},{"volume-title":"The 10 states with the most suspended\/revoked licenses","author":"Insights","key":"ref35"}],"event":{"name":"2023 Fifth International Conference on Blockchain Computing and Applications (BCCA)","start":{"date-parts":[[2023,10,24]]},"location":"Kuwait, Kuwait","end":{"date-parts":[[2023,10,26]]}},"container-title":["2023 Fifth International Conference on Blockchain Computing and Applications (BCCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10338825\/10338826\/10338923.pdf?arnumber=10338923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T23:00:09Z","timestamp":1703026809000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10338923\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,24]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/bcca58897.2023.10338923","relation":{},"subject":[],"published":{"date-parts":[[2023,10,24]]}}}