Skip to main content

From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control