<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Analyzing Terms of Use Adoption in SSI Digital Wallets: A Review of Current Implementations</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Stefano Bistarelli</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Chiara Luchini</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesco Santini</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Mathematics and Computer Science “Ulisse Dini”, University of Florence, Viale Giovanni Battista Morgagni 67/a</institution>
          ,
          <addr-line>50134 Florence (FI)</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Mathematics and Computer Science, University of Perugia</institution>
          ,
          <addr-line>Via Vanvitelli 1, 06123 Perugia (PG)</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <abstract>
        <p>The landscape of digital identity is undergoing a profound transformation, shifting from centralized architectures to user-centric and decentralized models such as Self-Sovereign Identity (SSI ). SSI has demonstrated its applicability in domains such as healthcare and education, ofering enhanced autonomy and data protection through technologies such as Verifiable Credentials (VCs). In parallel, regulatory frameworks such as the European Union's eIDAS 2.0 have accelerated the development of interoperable digital identity solutions, notably the European Digital Identity Wallet (EUDIW ), aligning with the principles of SSI. Despite this progress, most existing SSI wallet implementations remain focused on individual users, lacking essential features for organizational contexts. In this study, we address this gap by conducting a systematic secondary review of the current landscape of industrial digital wallets, assessing their implementation of the Terms of Use (ToU ) field. Our paper aims to inform the development of digital wallets tailored to enterprises and governments in SSI ecosystems.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Digital Wallet</kwd>
        <kwd>Terms of Use</kwd>
        <kwd>Self-Sovereign Identity</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The ToU property, as defined in the Verifiable Credentials Data Model v2.0 [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] by the World Wide Web
Consortium (W3C), ofers a standardized mechanism for specifying the legal and operational conditions
under which a verifiable credential or presentation is issued. This functionality can be particularly
relevant in contexts where the transferability of credentials, such as employee information, must be
restricted or governed by specific policies. Consequently, the ToU property is considered a requirement
for digital wallets designed to support organizational use cases. However, due to the relatively recent
redefinition of the ToU specification and the limited awareness surrounding its practical implications,
many existing wallet implementations do not yet support or prioritize this feature.
      </p>
      <p>This paper reviews the current state of industrial digital identity wallets, focusing on their
implementation of the ToU property to support the development of SSI solutions for companies and governments.
Using a secondary systematic review of academic and gray literature, the study identifies and analyzes
a representative set of wallets for ToU support. The paper is organized as follows: Section 2 introduces
the SSI architecture and the role of digital wallets; Section 3 details the research methodology, and
Section 5 reviews existing literature. Finally, Section 6 presents the findings and outlines future research
direction.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Digital wallets and SSI</title>
      <p>
        This section introduces the concept of SSI, emphasizing its architecture, core components, and the
role of digital wallets. SSI represents a shift in digital identity management by placing individuals
at the center of control, in contrast to the traditional client-server model that has long positioned
users as passive recipients of services managed by centralized authorities. In response, SSI proposes a
user-centric approach grounded in ten foundational principles outlined by Christopher Allen [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], which
promote privacy, transparency, user consent, and interoperability.
      </p>
      <p>
        At the heart of the SSI ecosystem are three key actors: the identity holder (typically the user), the
issuer (a trusted authority that issues credentials), and the verifier (an entity that requests and checks
those credentials). These interactions may be enhanced by decentralized technologies like blockchain,
which provide a trust layer without relying on centralized control. Digital identities in SSI are managed
through Verifiable Credentials (VCs) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], which are digitally signed claims about a subject that include
metadata, attributes, and cryptographic proofs of authenticity. These credentials can be aggregated
into Verifiable Presentations (VPs), which allow users to share selected information with verifiers. Both
VCs and VPs can include ToU that define how, when, and by whom the information may be used,
providing an additional layer of legal and contextual control, particularly valuable in sensitive or
regulated environments.
      </p>
      <p>
        Importantly, SSI is not limited to managing the identities of individuals [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ]. It extends to
organizations, devices, and even non-human entities, allowing for a broad and adaptable application of
identity management. Credentials are stored securely in digital wallets—user-managed applications
that function as personal identity managers.
      </p>
      <p>
        Digital wallets are central to the implementation of SSI. More than just secure storage tools, they
empower users to manage, share, and control their credentials across diferent domains, such as
healthcare, education, finance, and public services. As highlighted in recent studies [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], digital wallets ofer
notable benefits, such as improved eficiency, enhanced security, and stronger privacy, that serve both
individuals and organizations. Furthermore, digital wallets play a key role in achieving interoperability
between diferent identity systems. Through standardized data formats and communication
protocols, such as the W3C Verifiable Credentials and DID specifications, wallets may support credential
exchange in various domains, including public services, healthcare, education, finance, and more. This
lfexibility supports the development of a unified digital identity experience, reducing the dependence
on centralized authorities.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Research Method</title>
      <p>
        This study investigates current implementations of digital wallets within SSI systems that incorporate the
ToU field as a mechanism to restrict the use of VCs or VPs. Given the limited awareness and adoption
of this feature, primarily due to criticisms that it was “insuficiently specified” [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], we anticipate
identifying only a small number of technologies that use it. In particular, in response to these concerns,
the specification of the ToU field has been revised and updated in subsequent documentation [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>
        To identify the most relevant studies and minimize research bias, it is essential to establish a
welldefined review protocol. This includes the formulation of our research questions, which were guided
by the Population, Intervention, Comparison, Outcome, Context (PICOC) framework [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ], adapted to
the specific focus of our study. The “Population” includes digital wallets within SSI systems, while the
“Intervention” refers to tools or methods that enhance these wallets, specifically those implementing
the ToU field. The “Comparison” component is not applicable, as traditional (non-SSI) wallets are not
considered. The “Outcomes” aims to identify and quantify SSI wallets that support the ToU field for
regulating VCs and VPs. The “Context” spans academic and industry literature, including systematic
reviews, technical reports, and white papers. Based on these criteria, we derive the following research
questions (RQs): “What are the current digital wallet technologies that support SSI systems regarding
their technical architecture and user privacy features?” (RQ1) and “Which digital wallets implement
the ToU field as defined in the Verifiable Credential Data Model specification?” ( RQ2).
      </p>
      <p>
        Following the formulation of the RQs, we identified the data sources to be considered for our
systematic review. Figure 1a shows the research flow process following the PRISMA framework 1.
According to Brereton et al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], the most relevant digital libraries for Software Engineering research
include: IEEE Xplore, ACM Digital Library, Google Scholar, CiteSeer Library, Inspec, ScienceDirect, and
EI Compendex. Based on this guidance, we selected IEEE Xplore, Scopus, and Web of Science (WoS).
For each selected source, we define an advanced search query built around a standard search string,
adapted to the specific syntax of each platform. The general search expression used was the following:“(
“self sovereign identity” OR “Self Sovereign Identity” OR ssi ) AND identity AND wallet)” (Q). For the
inclusion criteria, we restricted the results to English-language (I1) publications from 2020 to 2025 (I2)
within the fields of computer science or engineering ( I3). Table 1b shows the number of results based
on the search process considering the query and the inclusion criteria.
      </p>
      <p>
        The screening phase involved manual inspection of titles, abstracts, keywords, and conclusions,
excluding non-peer-reviewed and narrowly focused studies. Preference was given to surveys and
reviews of literature discussing digital identity wallets, particularly those that addressed design, privacy,
and usability. This yielded 23 primary studies for analysis. The initial search results were consolidated
and de-duplicated, revealing Scopus as the most comprehensive source. In contrast, IEEE Xplore and
Web of Science contributed only a limited number of unique entries, as illustrated in Figure 1c. To
broaden the dataset, the study employed a Snowballing method [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], utilizing both Backward and
Forward Snowballing to identify additional 18 relevant papers through iterative citation tracking. Two
more sources were manually included: the Gimly GitHub repository [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] and the European Blockchain
Association’s website [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. This process culminated in a final dataset of 43 documents for in-depth
examination.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Digital Wallets Analysis</title>
      <p>From the final set of 43 documents, digital wallets mentioned or used for comparison were extracted.
The analysis focused solely on the currently implemented solutions, explicitly excluding academic
proposals or prototypes. As a result, only identity wallets developed by companies or organizations
were selected. More than 30 industrial wallets were identified, although only a subset of the most
frequently cited implementations is presented. It should be noted that several documents did not
1PRISMA flow diagram: https://www.prisma-statement.org/prisma-2020-flow-diagram.</p>
      <sec id="sec-4-1">
        <title>Database Q</title>
        <sec id="sec-4-1-1">
          <title>IEEE 37</title>
        </sec>
        <sec id="sec-4-1-2">
          <title>Xplore</title>
          <p>Web of Sci- 49
ence</p>
        </sec>
        <sec id="sec-4-1-3">
          <title>SCOPUS 90</title>
        </sec>
      </sec>
      <sec id="sec-4-2">
        <title>Total I1</title>
        <p>48
36
46
88
36
80</p>
        <p>
          Final N°
36
36
(b) Results of search process with inclusion
criteria.
(a) Research process flow based on PRISMA framework [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ].
(c) Percentage of documents by file
combination.
reference industrial wallets, instead focusing on experimental or academic models. Figure 2 highlights
the most frequently mentioned industrial implementations from the past five years.
        </p>
        <p>
          Although these wallets generally adhere to the principles and concepts of SSI, they exhibit notable
diferences in terms of functionality and technical implementation, which present challenges in
interoperability [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]. Furthermore, several digital wallets are no longer commercially available, and
the majority remain in an early or relatively immature stage of development [
          <xref ref-type="bibr" rid="ref22 ref23">22, 23</xref>
          ]. For example,
Jolocom, a Berlin-based SSI pioneer, ceased operations due to bankruptcy. Its SmartWallet, last updated
in mid-2023, shows no signs of ongoing development, and both its website and whitepaper are no
longer available. ShoCard was discontinued following its acquisition by Ping Identity in 2019. The
uPort project was oficially split into Veramo and Serto in 2021. Although the archived uPort Mobile app
remains accessible, it has not been updated since 2019. Consequently, the Veramo framework stands in
place of uPort, being regarded as its functional successor.
        </p>
        <p>15
s
e
cen10
r
r
u
c
cO 5
0</p>
        <p>LisJsoCiloocnonmect.MeTrinsicEsatuGsatacSaelfKSehyoCarduPVoIDrtwalletYTiavlia(oIRMKAa)yTruswtalt.id Vendors/Wallets</p>
        <p>
          As mentioned above, [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] identifies key requirements for enterprise-oriented SSI solutions. The
authors analyzed six digital wallets from diferent vendors, namely Jolocom, Lissi, Esatus, Trinsic,
CARO, and the Business Partner Agent by Bosch, highlighting that none of them satisfied the ToU
requirement as of 2024. In this work, we revisit some of those implementations to verify whether they
have been updated to support this feature. In addition, our analysis includes a broader set of digital
wallets, as illustrated in Figure 2. This analysis re-examines some of those implementations to assess
any recent updates and expands the scope to include a broader range of digital wallets, as shown in
Figure 2.
        </p>
        <p>
          According to [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ], wallets such as Lissi, Connect.me, Gataca, and SelfKey are not designed for
enterprise use. Moreover, most of the surveyed wallets are open source; proprietary exceptions include
Gataca and VIDwallet. The source code for esatus, Lissi, Gataca, and VIDwallet could not be retrieved,
so these wallets are only briefly described. We present an overview of the selected open-source digital
wallets and assess their current ToU implementation status:
• Lissi: Lissi Wallet (Let’s Initiate Self-Sovereign Identity) [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ] is a digital identity wallet developed
by Neosfer GmbH in partnership with Commerzbank AG and launched in 2019. Lissi plays
a central role in European projects like IDunion [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ], which aims to build an interoperable,
DLT-based identity infrastructure across Europe. In line with evolving EU regulations, Lissi has
introduced the EUDI-Wallet Connector to ensure seamless integration with all oficial
EUDIWallets across the EU, maintaining adaptability to future standards.
• Connect.me: Connect.Me [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ] is a mobile SSI wallet developed by Evernym and one of the first
to be built on the Sovrin network. It enables users to collect, manage, and share verifiable digital
credentials while maintaining full control over their digital identity. Built on Hyperledger Indy
and using Hyperledger Ursa for cryptography, the wallet enables secure pairwise connections,
credential storage, and the selective disclosure of information. However, based on an analysis of
the publicly available source code on GitHub, there is no evidence of native support for the ToU
property in the current implementation.
• Trinsic: Trinsic [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ] is a U.S.-based company founded in 2019 that focuses on digital identity
solutions. After selling its decentralized identity platform to Dentity in December 2024, Trinsic
shifted its focus to the Identity Acceptance Network, a system designed to streamline identity
verification by accepting pre-verified digital IDs from over 100 million users. Trinsic ofers
developer-friendly tools, including SDKs in various programming languages and APIs for handling
VCs and DIDs. While the platform promotes open standards and interoperability, it currently
lacks native support for the ToU field.
• Jolocom: Jolocom [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ] was a Berlin-based company focused on decentralized digital identity
solutions in line with SSI principles. Although the company has ceased operations, its open-source
tools remain available to the public. Key oferings include the Jolocom SDK, which supports
the development and verification of digital identities, and the SmartWallet, a mobile app for
managing credentials and performing SSI-related actions, such as selective disclosure. Based on
the current state of the GitHub repositories and the absence of updates since 2023, we confirm the
observation made in [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] that the ToU property is not implemented in Jolocom’s current toolset.
• esatus: esatus AG [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ] is a German IT service provider with over 35 years of experience,
specializing in information security, identity and access governance, and digital identity management.
Since 2015, the company has been actively engaged in the development of SSI technologies and
contributes to major European initiatives such as IDunion. Its flagship product, esatus SOWL,
ofers a comprehensive SSI solution designed for seamless integration into existing IT
infrastructures. It features a modern, container-based architecture and supports various authentication and
authorization protocols, enabling secure and eficient identity management.
• Gataca: Gataca [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ] founded in 2017 as an academic research initiative at MIT, with the mission
of tackling cybersecurity threats and identity fraud in conducting business online. Today, it has
evolved into a leading European player in the SSI space, ofering advanced decentralized identity
solutions. Gataca Wallet is a mobile application that provides unlimited, encrypted storage for
identity credentials, including national identification cards, driver’s licenses, insurance cards, and
academic diplomas.
• SelfKey: SelfKey [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ] is a blockchain-based decentralized autonomous organization (DAO)
dedicated to developing an SSI platform. Central to its ecosystem is the open-source SelfKey
Identity Wallet, which allows users to manage digital identities, securely store personal documents,
and handle cryptocurrencies such as ETH and KEY—the platform’s native ERC-20 utility token.
The token facilitates staking, service access, and incentivization of trusted behavior. Based on an
analysis of its GitHub repository, the wallet lacks support for the W3C-defined ToU property in
Verifiable Credentials. While a term class exists, it is limited to displaying the wallet’s own terms
or managing KYC agreements, rather than embedding ToU metadata within credentials.
• PingOne Neo (ex ShoCard): ShoCard was a blockchain-based IdM system designed to allow
users to securely store and manage their digital identities [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ]. Following its acquisition by Ping
Identity in 2020 [
          <xref ref-type="bibr" rid="ref34">34</xref>
          ], ShoCard’s foundational concepts were integrated into PingOne Neo [
          <xref ref-type="bibr" rid="ref35">35</xref>
          ],
a decentralized identity platform grounded in SSI principles. Key components of the platform
include PingOne Verify, which uses oficial documentation and biometric verification for
hightrust identity validation, and PingOne Credential, which supports customizable credential formats.
Additionally, the PingOne Neo SDK facilitates the integration of digital identity features into
mobile applications, providing developers with a flexible and secure infrastructure for building
decentralized identity solutions. Although the platform does not natively implement the ToU
ifeld, its design allows for the incorporation of such a field.
• VIDwallet: VIDwallet [
          <xref ref-type="bibr" rid="ref36">36</xref>
          ], developed by Validated ID, is a mobile-based digital identity wallet
designed to replace traditional physical wallets. It is the first digital wallet to achieve full
compliance with the EBSI across all supported use cases. VIDwallet enables users to securely
store and present personal credentials, including driver’s licenses, passports, and vaccination
records, for both in-person and online authentication scenarios. The wallet is ledger-agnostic,
supporting a range of distributed ledger technologies (DLTs), including EBSI, Ethereum, and
Velocity. It also works independently of distributed networks by employing the DID key method.
While VIDwallet refers specifically to the mobile application, it is integrated into the broader
VIDidentity ecosystem, which encompasses complementary services such as VIDcredentials
Studio, VIDissuer, and VIDconnect.
• Veramo: Veramo [
          <xref ref-type="bibr" rid="ref37">37</xref>
          ] is a JavaScript framework designed for managing verifiable data,
emphasizing flexibility, modularity, and cross-platform operability. It enables developers to build identity
agents and deploy decentralized identity solutions across various environments, including Node.js,
web browsers, and React Native, through a unified and consistent API. In 2023, the project was
oficially transferred to the Decentralized Identity Foundation (DIF) and is now maintained by the
Veramo User Group. While Veramo does not natively support the ToU property in VCs or VPs,
its extensible design allows for the creation of custom plugins to implement such functionality.
• Talao: Talao [
          <xref ref-type="bibr" rid="ref38">38</xref>
          ] is a French mobile identity wallet developed by the European startup Talao,
specifically designed to align with the European Self-Sovereign Identity Framework (ESSIF).
According to the oficial documentation and the publicly available source code on GitHub, the
ToU field is not natively implemented. However, the TALAO project is based on two foundational
components developed by SpruceID: DIDKit and SSI. The SpruceID VC syntax includes native
support for the ToU field, which is therefore available at the infrastructure level, although it is
not yet used by default in the wallet implementation.
• Yivi (IRMA): Yivi [
          <xref ref-type="bibr" rid="ref39">39</xref>
          ], formerly known as IRMA, is a privacy-centric, open-source authentication
system developed by the Privacy by Design Foundation. It implements the Idemix attribute-based
credential scheme, enabling users to manage digitally signed personal attributes issued by trusted
entities. These credentials are stored locally on the mobile app and can be selectively shared with
verifiers, who validate them using the issuer’s public key. Each credential follows a specific type
that defines its structure and authorized issuers. The oficial documentation and the source code
available in the GitHub repository do not discuss any ToU field.
• KayTrust: KayTrust [
          <xref ref-type="bibr" rid="ref40">40</xref>
          ] is a mobile wallet by NTT Data to manage digital credentials in
various use cases, such as diplomas and vaccination certificates. It ensures data integrity and
trust through real-time verification via the LACChain Ethereum network. The platform ofers
technical resources, including reference implementations, SDKs for Java and JavaScript/NodeJS,
and deployable apps such as KayTrust Wallet and KayTrust Provider. According to the oficial
documentation and publicly available source code on GitHub, the KayTrust ecosystem does not
currently implement the ToU field as part of its verifiable credential schema.
• walt.id: walt.id [
          <xref ref-type="bibr" rid="ref41">41</xref>
          ] is a leading provider of open-source digital identity and wallet infrastructure,
founded in 2021. It enables developers, public institutions, and private enterprises to design and
deploy secure, scalable, and interoperable identity solutions across a broad spectrum of industries.
The platform ofers a wide suite of tools, including cross-platform libraries, RESTful APIs, and
customizable white-label applications. According to both the oficial documentation and source
code on GitHub, walt.id currently supports the use of the ToU field in VCs.
        </p>
      </sec>
      <sec id="sec-4-3">
        <title>Wallet</title>
        <sec id="sec-4-3-1">
          <title>Connect.Me</title>
        </sec>
      </sec>
      <sec id="sec-4-4">
        <title>Vendor</title>
        <sec id="sec-4-4-1">
          <title>Evernym</title>
        </sec>
        <sec id="sec-4-4-2">
          <title>Trinsic Trinsic Technologies Inc</title>
        </sec>
        <sec id="sec-4-4-3">
          <title>Jolocom SmartWal- Jolocom let/Jolocom SDK</title>
        </sec>
        <sec id="sec-4-4-4">
          <title>SelfKey Identity Wal- SelfKey let</title>
        </sec>
        <sec id="sec-4-4-5">
          <title>PingOne Neo SDK (Shocard)</title>
        </sec>
        <sec id="sec-4-4-6">
          <title>Veramo (uPort)</title>
        </sec>
        <sec id="sec-4-4-7">
          <title>Talao Wallet</title>
        </sec>
        <sec id="sec-4-4-8">
          <title>Yivi (IRMA)</title>
        </sec>
        <sec id="sec-4-4-9">
          <title>KayTrust SDK walt.id</title>
        </sec>
        <sec id="sec-4-4-10">
          <title>PingOne Identity</title>
        </sec>
        <sec id="sec-4-4-11">
          <title>DIF/Veramo User</title>
        </sec>
        <sec id="sec-4-4-12">
          <title>Group</title>
        </sec>
        <sec id="sec-4-4-13">
          <title>Talao</title>
        </sec>
        <sec id="sec-4-4-14">
          <title>Privacy by Design</title>
        </sec>
        <sec id="sec-4-4-15">
          <title>Foundation</title>
        </sec>
        <sec id="sec-4-4-16">
          <title>NTT DATA walt.id</title>
          <p>
            ToU
No
No
No
No
No
No
No
No
No
Yes
Apache 2.0 [
            <xref ref-type="bibr" rid="ref18 ref22 ref24 ref42 ref43 ref44 ref45 ref46 ref47 ref48 ref49 ref50 ref51 ref52">42, 43, 24, 44, 22, 45, 46, 47, 48, 49,
18, 50, 51, 52</xref>
            ]
MIT [
            <xref ref-type="bibr" rid="ref18 ref19 ref22 ref24 ref42 ref44 ref45 ref49 ref50 ref51 ref52 ref53 ref54 ref6">42, 53, 54, 24, 44, 22, 45, 49, 18, 50,
51, 52, 6, 19</xref>
            ]
AA2-SDK of [42, 55, 24, 44, 46, 43, 18, 49, 50, 51,
Governikus 56, 6, 19]
          </p>
        </sec>
        <sec id="sec-4-4-17">
          <title>GmbH/Apache 2.0 MIT [42, 24, 49, 18, 51, 57]</title>
        </sec>
        <sec id="sec-4-4-18">
          <title>Apache 2.0</title>
        </sec>
        <sec id="sec-4-4-19">
          <title>Apache 2.0</title>
        </sec>
        <sec id="sec-4-4-20">
          <title>Apache 2.0</title>
        </sec>
        <sec id="sec-4-4-21">
          <title>GPLv3</title>
        </sec>
        <sec id="sec-4-4-22">
          <title>Apache 2.0</title>
          <p>Apache 2.0</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Related Work</title>
      <p>
        Several studies have examined the evolving role and requirements of identity wallets in the digital
age, each contributing unique insights into their development, use, and governance. One such study
by Podgorelec et al. [60] provides a systematic review of the academic literature on digital wallets
used for identity management. The authors analyze 26 peer-reviewed papers to clarify definitions,
functionalities, and capabilities of identity wallets, aiming to shed light on the motivations behind their
adoption and the features they ofer. Our research draws from both scholarly and non-academic sources,
with a specific emphasis on identity wallets built around SSI principles. Ansaroudi et al. [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] ofer a
more technical perspective by proposing a classification system for identity wallets based on two main
criteria: mechanisms for establishing trust and strategies for controlling the sharing of credentials. Their
analysis builds on the Trust over IP (ToIP) layered framework, highlighting technologies that support
tamper-proof credentials and secure, selective disclosure. Our study complements this by evaluating
digital wallets through the lens of organizational and governmental requirements, particularly regarding
the ToU feature. Bochnia et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] contribute to the discussion by outlining a comprehensive set of
requirements for SSI systems within organizational contexts. These include technical, operational, and
relational aspects of credential management and inter-organizational identity. Their work also identifies
gaps between current SSI solutions and the needs of enterprise environments. Building on their findings,
we revisit several of the wallets they reviewed and expand the analysis to include additional industrial
solutions. Zhang et al. [59] explore the broader theme of data sovereignty within the Web 3.0 landscape,
positioning SSI as a key enabler of user-centric digital identity. Their study outlines major challenges
in the field, such as key management, scalability, and interoperability, and also addresses unresolved
issues like managing dynamic attributes, user personas, and attribute ownership—critical hurdles
for current SSI architectures. Samir et al. [61] introduce Decentralized Trustworthy Self-Sovereign
Identity Management (DT-SSIM), a decentralized identity management framework that uses Shamir’s
Secret Sharing, blockchain, and smart contracts to enhance privacy and security. The authors present
a comparative analysis of existing solutions like ShoCard, SelfKey, Sovrin, and uPort, emphasizing
DT-SSIM’s innovative architecture. Finally, Rota’s Master’s thesis [62] presents the development of a
standalone SSI framework based on blockchain and MetaMask, which was later integrated into the Data
Cellar project by the Links Foundation. The thesis also includes a preliminary evaluation of existing
SSI-based identity management systems such as ShoCard, Sovrin, and uPort.
      </p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>The digital identity space is shifting toward more user-centric and privacy-preserving models through
the adoption of SSI architectures. This paper examines whether industrial digital identity wallets support
the ToU property. Based on a structured review of academic and gray literature, a representative set of
wallets was analyzed for ToU compliance. The results show limited adoption of the ToU feature, despite
its potential, particularly among enterprise-oriented wallets.</p>
      <p>Future research should broaden the scope to include wallets aligned with EUDIW or integrated into
EBSI and implement the ToU property in practice. Such work would demonstrate the benefits of ToU
for legal traceability, data governance, and interoperability, advancing SSI adoption in the enterprise
and government sectors.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments</title>
      <p>Stefano Bistarelli and Chiara Luchini are members of the INdAM Research group GNCS, and all three
authors are members of Consorzio CINI. This work has been partially supported by: GNCS-INdAM,
CUP_E53C23001670001; MUR PNRR project SERICS (PE00000014 AQuSDIT: CUP_H73C22000880001,
COVERT: CUP_J93C23002310006), funded by the European Union – Next Generation EU; EU MUR
PNRR project VITALITY (J97G22000170005), funded by the European Union – Next Generation EU;
University of Perugia - Fondo Ricerca di Ateneo (2020, 2022) – Projects BLOCKCHAIN4FOODCHAIN,
FICO, RATIONALISTS, “Civil Safety and Security for Society”.</p>
    </sec>
    <sec id="sec-8">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the author(s) utilized ChatGPT and Grammarly to perform the
following tasks: grammar and spelling checks, paraphrasing and rewording, and enhancing writing
style. After using these tools and services, the author(s) reviewed and edited the content as needed and
took full responsibility for the content of the publication.
privacy decisions!’ - designing privacy-preserving user interfaces for SSI wallets on
smartphones, IEEE Access 11 (2023) 131814–131835. URL: https://doi.org/10.1109/ACCESS.2023.3334908.
doi:10.1109/ACCESS.2023.3334908.
[56] Y. Liu, Q. Lu, H. Paik, X. Xu, Design patterns for blockchain-based self-sovereign identity, in:
EuroPLoP ’20: European Conference on Pattern Languages of Programs 2020, Virtual Event,
Germany, 1-4 July, 2020, ACM, 2020, pp. 16:1–16:14. URL: https://doi.org/10.1145/3424771.3424802.
doi:10.1145/3424771.3424802.
[57] F. Ghafari, K. Gilani, E. Bertin, N. Crespi, Identity and access management using distributed
ledger technology: A survey, Int. J. Netw. Manag. 32 (2022). URL: https://doi.org/10.1002/nem.2180.
doi:10.1002/NEM.2180.
[58] A. Bazarhanova, K. Smolander, The review of non-technical assumptions in digital identity
architectures, in: 53rd Hawaii International Conference on System Sciences, HICSS 2020, Maui,
Hawaii, USA, January 7-10, 2020, ScholarSpace, 2020, pp. 1–10. URL: https://hdl.handle.net/10125/
64527.
[59] K. L. Tan, C.-H. Chi, K.-Y. Lam, Survey on digital sovereignty and identity: From digitization to
digitalization, ACM Comput. Surv. 56 (2023). doi:10.1145/3616400.
[60] B. Podgorelec, L. Alber, T. Zeferer, What is a (digital) identity wallet? A systematic literature
review, in: H. V. Leong, S. S. Sarvestani, Y. Teranishi, A. Cuzzocrea, H. Kashiwazaki, D. Towey,
J. Yang, H. Shahriar (Eds.), 46th IEEE Annual Computers, Software, and Applications Conferenc,
COMPSAC 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022, IEEE, 2022, pp. 809–818. doi:10.
1109/COMPSAC54236.2022.00131.
[61] E. Samir, H. Wu, M. Azab, C. Xin, Q. Zhang, Dt-ssim: A decentralized trustworthy self-sovereign
identity management framework, IEEE Internet of Things Journal 9 (2022) 7972–7988. doi:10.
1109/JIOT.2021.3112537.
[62] L. Rota, Decentralized Identity Management: Building and Integrating a Self-Sovereign Identity
Framework, Master’s thesis, Politecnico di Torino, 2024. http://webthesis.biblio.polito.it/id/eprint/
30910.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lacity</surname>
          </string-name>
          , E. Carmel,
          <article-title>Implementing self-sovereign identity (ssi) for a digital staf passport at uk nhs</article-title>
          , University of Arkansas (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>E.</given-names>
            <surname>Tan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Lerouge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. Du</given-names>
            <surname>Caju</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          <article-title>Du Seuil, Verification of education credentials on european blockchain services infrastructure (ebsi): Action research in a cross-border use case between belgium and italy</article-title>
          ,
          <source>Big Data and Cognitive Computing</source>
          <volume>7</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .3390/bdcc7020079.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>European</given-names>
            <surname>Commission</surname>
          </string-name>
          ,
          <article-title>The European Digital Identity Wallet Architecture and Reference Framework | Shaping Europe's Digital Future</article-title>
          .,
          <source>Technical Report, European Commission</source>
          ,
          <year>2023</year>
          . https://digital-strategy.ec.europa.eu/en/library/ european
          <article-title>-digital-identity-wallet-architecture-and-reference-framework.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>European</given-names>
            <surname>Commission</surname>
          </string-name>
          ,
          <source>Eu digital identity wallet</source>
          ,
          <year>2025</year>
          . https://tinyurl.com/2rzfvt3c.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>[5] Dipartimento per la trasformazione digitale, It-wallet: three digital documents available for all italian citizens</article-title>
          and residents,
          <year>2024</year>
          . https://tinyurl.com/yc6bc6ud.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R.</given-names>
            <surname>Bochnia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Richter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Anke</surname>
          </string-name>
          ,
          <article-title>Self-sovereign identity for organizations: Requirements for enterprise software</article-title>
          ,
          <source>IEEE Access 12</source>
          (
          <year>2024</year>
          )
          <fpage>7637</fpage>
          -
          <lpage>7660</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2023</year>
          .
          <volume>3349095</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Sporny</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Longley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Chadwick</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Steele</surname>
          </string-name>
          ,
          <source>Verifiable Credentials Data Model v2.0</source>
          ,
          <string-name>
            <surname>Technical</surname>
            <given-names>Report</given-names>
          </string-name>
          ,
          <source>World Wide Web Consortium (W3C)</source>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>C.</given-names>
            <surname>Allen</surname>
          </string-name>
          ,
          <article-title>The path to self-sovereign identity</article-title>
          ,
          <year>2016</year>
          . URL: http://www.lifewithalacrity.com/
          <year>2016</year>
          /04/ the-path
          <article-title>-to-self-soverereign-identity</article-title>
          .html.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>P. C.</given-names>
            <surname>Bartolomeu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Vieira</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Hosseini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ferreira</surname>
          </string-name>
          ,
          <article-title>Self-sovereign identity: Use-cases, technologies, and challenges for industrial iot</article-title>
          ,
          <source>in: 24th IEEE International Conference on Emerging Technologies and Factory Automation</source>
          ,
          <string-name>
            <surname>ETFA</surname>
          </string-name>
          <year>2019</year>
          , Zaragoza, Spain,
          <source>September 10-13</source>
          ,
          <year>2019</year>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>1173</fpage>
          -
          <lpage>1180</lpage>
          . doi:
          <volume>10</volume>
          .1109/ETFA.
          <year>2019</year>
          .
          <volume>8869262</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>N. V.</given-names>
            <surname>Kulabukhova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ivashchenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Tipikin</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Minin</surname>
          </string-name>
          ,
          <article-title>Self-sovereign identity for iot devices</article-title>
          , in: S.
          <string-name>
            <surname>Misra</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Gervasi</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Murgante</surname>
            ,
            <given-names>E. N.</given-names>
          </string-name>
          <string-name>
            <surname>Stankova</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Korkhov</surname>
            ,
            <given-names>C. M.</given-names>
          </string-name>
          <string-name>
            <surname>Torre</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. M. A. C. Rocha</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Taniar</surname>
            ,
            <given-names>B. O.</given-names>
          </string-name>
          <string-name>
            <surname>Apduhan</surname>
          </string-name>
          , E. Tarantino (Eds.),
          <source>Computational Science and Its Applications - ICCSA</source>
          <year>2019</year>
          - 19th International Conference, Saint Petersburg,
          <source>Russia, July 1-4</source>
          ,
          <year>2019</year>
          , Proceedings,
          <string-name>
            <surname>Part</surname>
            <given-names>II</given-names>
          </string-name>
          , volume
          <volume>11620</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2019</year>
          , pp.
          <fpage>472</fpage>
          -
          <lpage>484</lpage>
          . doi:
          <volume>10</volume>
          .1007/ 978-3-
          <fpage>030</fpage>
          -24296-1\_
          <fpage>37</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Babel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Willburger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lautenschlager</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Völter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Guggenberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Körner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sedlmeir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Strüker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Urbach</surname>
          </string-name>
          ,
          <article-title>Self-sovereign identity and digital wallets</article-title>
          ,
          <source>Electron. Mark</source>
          .
          <volume>35</volume>
          (
          <year>2025</year>
          )
          <article-title>28</article-title>
          . doi:
          <volume>10</volume>
          .1007/S12525-025-00772-0.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>World</given-names>
            <surname>Wide Web</surname>
          </string-name>
          <article-title>Consortium (W3C), termsofuse is insuficiently specified</article-title>
          , https://github.com/ w3c/vc-data-model/issues/1010,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>World</given-names>
            <surname>Wide Web</surname>
          </string-name>
          <article-title>Consortium (W3C), Update to terms of use description</article-title>
          , https://github.com/w3c/ vc-data-model/pull/1295,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Petticrew</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Roberts</surname>
          </string-name>
          ,
          <article-title>Systematic Reviews in the Social Sciences: A Practical Guide</article-title>
          , volume
          <volume>11</volume>
          ,
          <string-name>
            <surname>Blackwell</surname>
            <given-names>Publishing</given-names>
          </string-name>
          ,
          <year>2006</year>
          . doi:
          <volume>10</volume>
          .1002/9780470754887.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>B.</given-names>
            <surname>Kitchenham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Charters</surname>
          </string-name>
          ,
          <article-title>Guidelines for performing systematic literature reviews in software engineering 2 (</article-title>
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>P.</given-names>
            <surname>Brereton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. A.</given-names>
            <surname>Kitchenham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Budgen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Turner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Khalil</surname>
          </string-name>
          ,
          <article-title>Lessons from applying the systematic literature review process within the software engineering domain</article-title>
          ,
          <source>Journal of Systems and Software</source>
          <volume>80</volume>
          (
          <year>2007</year>
          )
          <fpage>571</fpage>
          -
          <lpage>583</lpage>
          . doi:https://doi.org/10.1016/j.jss.
          <year>2006</year>
          .
          <volume>07</volume>
          .009, software Performance.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>C.</given-names>
            <surname>Wohlin</surname>
          </string-name>
          ,
          <article-title>Guidelines for snowballing in systematic literature studies and a replication in software engineering</article-title>
          , in: M. J.
          <string-name>
            <surname>Shepperd</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Hall</surname>
          </string-name>
          , I. Myrtveit (Eds.),
          <source>18th International Conference on Evaluation and Assessment in Software Engineering</source>
          , EASE '
          <fpage>14</fpage>
          , London, England, United Kingdom, May
          <volume>13</volume>
          -14,
          <year>2014</year>
          , ACM,
          <year>2014</year>
          , pp.
          <volume>38</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>38</lpage>
          :
          <fpage>10</fpage>
          . doi:
          <volume>10</volume>
          .1145/2601248.2601268.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Gimly</surname>
          </string-name>
          , Ssi wallets,
          <year>2022</year>
          . https://github.com/Gimly-Blockchain/ssi-wallets.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>European</given-names>
            <surname>Blockchain</surname>
          </string-name>
          <string-name>
            <surname>Association</surname>
          </string-name>
          , Ssi wallets,
          <year>2025</year>
          . https://europeanblockchainassociation.org/ ssi-wallets/.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>M. J. Page</surname>
            ,
            <given-names>J. E.</given-names>
          </string-name>
          <string-name>
            <surname>McKenzie</surname>
            ,
            <given-names>P. M.</given-names>
          </string-name>
          <string-name>
            <surname>Bossuyt</surname>
            , I. Boutron,
            <given-names>T. C.</given-names>
          </string-name>
          <string-name>
            <surname>Hofmann</surname>
            ,
            <given-names>C. D.</given-names>
          </string-name>
          <string-name>
            <surname>Mulrow</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Shamseer</surname>
            ,
            <given-names>J. M.</given-names>
          </string-name>
          <string-name>
            <surname>Tetzlaf</surname>
            ,
            <given-names>E. A.</given-names>
          </string-name>
          <string-name>
            <surname>Akl</surname>
            ,
            <given-names>S. E.</given-names>
          </string-name>
          <string-name>
            <surname>Brennan</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Chou</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Glanville</surname>
            ,
            <given-names>J. M.</given-names>
          </string-name>
          <string-name>
            <surname>Grimshaw</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Hróbjartsson</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Lalu</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>E. W.</given-names>
          </string-name>
          <string-name>
            <surname>Loder</surname>
            , E. Mayo-Wilson,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>McDonald</surname>
            ,
            <given-names>L. A.</given-names>
          </string-name>
          <string-name>
            <surname>McGuinness</surname>
            ,
            <given-names>L. A.</given-names>
          </string-name>
          <string-name>
            <surname>Stewart</surname>
            , J. Thomas,
            <given-names>A. C.</given-names>
          </string-name>
          <string-name>
            <surname>Tricco</surname>
            ,
            <given-names>V. A.</given-names>
          </string-name>
          <string-name>
            <surname>Welch</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Whiting</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Moher</surname>
          </string-name>
          ,
          <article-title>The prisma 2020 statement: an updated guideline for reporting systematic reviews</article-title>
          ,
          <source>BMJ</source>
          <volume>372</volume>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1136/bmj.n71. arXiv:https://www.bmj.com/content/372/bmj.n71.full.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>D. O'Donnell</surname>
          </string-name>
          ,
          <source>2023 wallet report update: Emerging trust layer, trust registries &amp; interoperability</source>
          , https://www.continuumloop.
          <source>com/2023-wallet-report-update/</source>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Cucko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kersic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Turkanovic</surname>
          </string-name>
          ,
          <article-title>Towards a catalogue of self-sovereign identity design patterns</article-title>
          ,
          <source>Applied Sciences</source>
          <volume>13</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .3390/app13095395.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>D.</given-names>
            <surname>Reed</surname>
          </string-name>
          ,
          <string-name>
            <surname>D. O'Donnell</surname>
          </string-name>
          ,
          <source>Digital wallet report 2021 update, http://continuumloop.com/ digital-wallet-report-update/</source>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>Z. E.</given-names>
            <surname>Ansaroudi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Carbone</surname>
          </string-name>
          , G. Sciarretta,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ranise</surname>
          </string-name>
          ,
          <article-title>Control is nothing without trust a first look into digital identity wallet trends</article-title>
          , in: V.
          <string-name>
            <surname>Atluri</surname>
            ,
            <given-names>A. L.</given-names>
          </string-name>
          Ferrara (Eds.),
          <source>Data and Applications Security and Privacy XXXVII - 37th Annual IFIP WG 11.3 Conference</source>
          , DBSec
          <year>2023</year>
          , Sophia-Antipolis, France,
          <source>July 19-21</source>
          ,
          <year>2023</year>
          , Proceedings, volume
          <volume>13942</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2023</year>
          , pp.
          <fpage>113</fpage>
          -
          <lpage>132</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -37586-6\_7.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Neosfer</surname>
            <given-names>GmbH</given-names>
          </string-name>
          , Lissi,
          <year>2025</year>
          . Lissi: https://www.lissi.id/.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>IDunion</surname>
          </string-name>
          ,
          <article-title>Idunion ermglicht selbstbestimmte identten</article-title>
          .,
          <year>2025</year>
          . https://idunion.org/.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Evernym</surname>
          </string-name>
          , Connect.me,
          <year>2023</year>
          . Connect.Me: https://github.com/evernym/ConnectMe, Evernym: https://www.evernym.com/.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>Trinsic</given-names>
            <surname>Technologies</surname>
          </string-name>
          <string-name>
            <surname>Inc</surname>
          </string-name>
          , Trinsic,
          <year>2025</year>
          . Trinsic: https://trinsic.id/,
          <string-name>
            <surname>Trinsic</surname>
            <given-names>SDK</given-names>
          </string-name>
          : https://github.com/ trinsic-id/sdk.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Jolocom</surname>
          </string-name>
          , Jocolom,
          <year>2022</year>
          . Jolocom SDK: https://github.com/jolocom/jolocom-sdk, Jolocom SmartWallet: https://github.com/jolocom/smartwallet-app.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>esatus</surname>
            <given-names>AG</given-names>
          </string-name>
          , esatus,
          <year>2025</year>
          . Esatus SOWL:https://esatus.com/en/digital-identity/.
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <surname>Gataca</surname>
          </string-name>
          , Gataca,
          <year>2025</year>
          . Gataca: https://gataca.io/, Gataca Wallet: https://gataca.io/products/wallet/.
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>SelfKey</surname>
          </string-name>
          , Selfkey foundation,
          <year>2024</year>
          . SelfKey: https://selfkey.org/, SelfKey Identity Wallet: https: //github.com/SelfKeyFoundation/Identity-Wallet.
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Obaidat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. K.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. R.</given-names>
            <surname>Choo</surname>
          </string-name>
          ,
          <article-title>Blockchain-based identity management systems: A review</article-title>
          ,
          <source>J. Netw. Comput. Appl</source>
          .
          <volume>166</volume>
          (
          <year>2020</year>
          )
          <article-title>102731</article-title>
          . doi:
          <volume>10</volume>
          .1016/J.JNCA.
          <year>2020</year>
          .
          <volume>102731</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>P.</given-names>
            <surname>Identity</surname>
          </string-name>
          ,
          <article-title>Ping identity acquires personal identity leader shocard to revolutionize privacy, streamline customer interactions and put users in control of their identity</article-title>
          ,
          <year>2020</year>
          . https://tinyurl.com/ mrcmejpb.
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <surname>Ping</surname>
            <given-names>Identity</given-names>
          </string-name>
          , Pingone neo,
          <year>2025</year>
          . PingOne Neo: https://tinyurl.com/ya379t5j, PingOne Credential: https://tinyurl.com/39f969we, PingOne Neo Native SDKs: https://github.com/pingidentity/ pingone
          <article-title>-neo-mobile-sdk.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <surname>Validated</surname>
            <given-names>ID</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vidwallet</surname>
          </string-name>
          ,
          <year>2025</year>
          . VIDWallet: https://www.validatedid.com/en/identity/vidwallet.
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>Decentralized</given-names>
            <surname>Identity Foundation (DIF) - Veramo User</surname>
          </string-name>
          Group, Veramo,
          <year>2025</year>
          . Veramo: https: //veramo.io/, Veramo User Group: https://blog.identity.foundation/veramo-user-group/.
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <surname>Talao</surname>
          </string-name>
          , Talao,
          <year>2025</year>
          . Talao: https://talao.io/, Talao Verifiable Credentials: https://doc.wallet-provider. io/vc_type, Talao Wallet: https://github.com/TalaoDAO/AltMe/tree/TALAO, SpruceID: https: //spruceid.com/, DIDKit - SpruceID: https://github.com/spruceid/didkit, SSI - SpruceID: https: //github.com/spruceid/ssi.
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <surname>Privacy by Design Foundation</surname>
          </string-name>
          , Yivi,
          <year>2025</year>
          . Yivi: https://www.yivi.app/en/., Yivi GitHub: https: //github.com/privacybydesign/irmamobile.
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>NTT</given-names>
            <surname>Data</surname>
          </string-name>
          , Kaytrust,
          <year>2025</year>
          . KayTrust: https://www.kaytrust.id/, KayTrust Documentation: https: //developer.kaytrust.id/, KayTrust Github: https://github.com/KayTrust.
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41] walt.id, walt.id,
          <year>2025</year>
          . Walt.id: https://walt.id/, walt.id GitHub: https://github.com/walt-id/ waltid-identity.
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>R.</given-names>
            <surname>Sellung</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Kubach, Research on user experience for digital identitywallets: state-of-the-art and recommendations</article-title>
          ,
          <source>in: Open Identity Summit</source>
          <year>2023</year>
          , Gesellschaft für Informatik eV,
          <year>2023</year>
          , pp.
          <fpage>39</fpage>
          -
          <lpage>50</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>A.</given-names>
            <surname>Khayretdinova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kubach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sellung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Roßnagel</surname>
          </string-name>
          ,
          <article-title>Conducting a usability evaluation of decentralized identity management solutions</article-title>
          , in: M.
          <string-name>
            <surname>Friedewald</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Kreutzer</surname>
          </string-name>
          , M. Hansen (Eds.), Selbstbestimmung, Privatheit und Datenschutz:
          <article-title>Gestaltungsoptionen für einen europäischen Weg</article-title>
          , DuD-Fachbeiträge, Springer Fachmedien Wiesbaden,
          <year>2022</year>
          , pp.
          <fpage>389</fpage>
          -
          <lpage>406</lpage>
          . URL: https://doi.org/10. 1007/978-3-
          <fpage>658</fpage>
          -33306-5_
          <fpage>19</fpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>658</fpage>
          -33306-5\_
          <fpage>19</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>S.</given-names>
            <surname>Cucko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Sumak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Turkanovic</surname>
          </string-name>
          ,
          <article-title>Identification and analysis of self-sovereign identity user interface and user experience design patterns</article-title>
          ,
          <source>in: IEEE International Conference on Decentralized Applications and Infrastructures</source>
          ,
          <string-name>
            <surname>DAPPS</surname>
          </string-name>
          <year>2023</year>
          , Athens, Greece,
          <source>July 17-20</source>
          ,
          <year>2023</year>
          , IEEE,
          <year>2023</year>
          , pp.
          <fpage>166</fpage>
          -
          <lpage>173</lpage>
          . URL: https://doi.org/10.1109/DAPPS57946.
          <year>2023</year>
          .
          <volume>00030</volume>
          . doi:
          <volume>10</volume>
          .1109/DAPPS57946.
          <year>2023</year>
          .
          <volume>00030</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>V.</given-names>
            <surname>Kersic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Vidovic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vrecko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Domajnko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Turkanovic</surname>
          </string-name>
          ,
          <article-title>Orchestrating digital wallets for on- and of-chain decentralized identity management</article-title>
          ,
          <source>IEEE Access 11</source>
          (
          <year>2023</year>
          )
          <fpage>78135</fpage>
          -
          <lpage>78151</lpage>
          . URL: https://doi.org/10.1109/ACCESS.
          <year>2023</year>
          .
          <volume>3299047</volume>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2023</year>
          .
          <volume>3299047</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [46]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kostic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Poikela</surname>
          </string-name>
          ,
          <article-title>Do users want to use digital identities? a study of a concept of an identity wallet</article-title>
          ,
          <source>in: Eighteenth Symposium on Usable Privacy and Security (SOUPS</source>
          <year>2022</year>
          ).
          <source>USENIX Association</source>
          , Boston, MA,
          <year>2022</year>
          , pp.
          <fpage>195</fpage>
          -
          <lpage>211</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [47]
          <string-name>
            <given-names>J.</given-names>
            <surname>Sedlmeir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Huber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. J.</given-names>
            <surname>Barbereau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Weigl</surname>
          </string-name>
          , T. Roth,
          <article-title>Transition pathways towards design principles of self-sovereign identity</article-title>
          ,
          <source>in: Proceedings of the 43rd International Conference on Information Systems (ICIS)</source>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [48]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sartor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sedlmeir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rieger</surname>
          </string-name>
          , T. Roth,
          <article-title>Love at first sight? A user experience study of selfsovereign identity wallets</article-title>
          , in: R.
          <string-name>
            <surname>Beck</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Petcu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Fotache</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Matook</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Helms</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Wiener</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Rusu</surname>
          </string-name>
          , T. Tuunanen (Eds.),
          <source>30th European Conference on Information Systems - New Horizons in Digitally United Societies, ECIS</source>
          <year>2022</year>
          , Timisoara, Romania, June 18-24,
          <year>2022</year>
          ,
          <year>2022</year>
          . URL: https: //aisel.aisnet.org/ecis2022_rp/46.
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [49]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kuperberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Klemens</surname>
          </string-name>
          ,
          <article-title>Integration of self-sovereign identity into conventional software using established IAM protocols: A survey</article-title>
          , in: H.
          <string-name>
            <surname>Roßnagel</surname>
            ,
            <given-names>C. H.</given-names>
          </string-name>
          <string-name>
            <surname>Schunck</surname>
          </string-name>
          , S. Mödersheim (Eds.),
          <source>Open Identity Summit</source>
          <year>2022</year>
          , Copenhagen, Denmark,
          <source>July 7-8</source>
          ,
          <year>2022</year>
          , volume P-325
          <string-name>
            <surname>of</surname>
            <given-names>LNI</given-names>
          </string-name>
          , Gesellschaft für Informatik e.V.,
          <year>2022</year>
          , pp.
          <fpage>51</fpage>
          -
          <lpage>62</lpage>
          . URL: https://doi.org/10.18420/OID2022_04. doi:
          <volume>10</volume>
          .18420/OID2022\_
          <fpage>04</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [50]
          <string-name>
            <given-names>R. N.</given-names>
            <surname>Zaeem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Khalil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lamison</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Pandey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Barber</surname>
          </string-name>
          ,
          <article-title>On the usability of self sovereign identity solutions</article-title>
          , University of Texas at Austin Center for Identity,
          <source>UTCID</source>
          (
          <year>2021</year>
          )
          <fpage>21</fpage>
          -
          <lpage>02</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          [51]
          <string-name>
            <given-names>R. N.</given-names>
            <surname>Zaeem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. C.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Liau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tyagi</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Khalil</surname>
            ,
            <given-names>M. R.</given-names>
          </string-name>
          <string-name>
            <surname>Lamison</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Pandey</surname>
            ,
            <given-names>K. S.</given-names>
          </string-name>
          <string-name>
            <surname>Barber</surname>
          </string-name>
          ,
          <article-title>Blockchain-based self-sovereign identity: Survey, requirements, usecases, and comparative study</article-title>
          , in: J.
          <string-name>
            <surname>He</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Unland</surname>
            ,
            <given-names>E. S.</given-names>
          </string-name>
          <string-name>
            <surname>Jr.</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          <string-name>
            <surname>Tao</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Purohit</surname>
          </string-name>
          , W. van den Heuvel, J. Yearwood, J. Cao (Eds.), WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence,
          <source>Melbourne VIC Australia, December 14 - 17</source>
          ,
          <year>2021</year>
          , ACM,
          <year>2021</year>
          , pp.
          <fpage>128</fpage>
          -
          <lpage>135</lpage>
          . URL: https://doi.org/10.1145/3486622.3493917. doi:
          <volume>10</volume>
          .1145/3486622.3493917.
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          [52]
          <string-name>
            <given-names>J.</given-names>
            <surname>Sedlmeir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Smethurst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rieger</surname>
          </string-name>
          , G. Fridgen,
          <article-title>Digital identities and verifiable credentials</article-title>
          ,
          <source>Bus. Inf. Syst. Eng</source>
          .
          <volume>63</volume>
          (
          <year>2021</year>
          )
          <fpage>603</fpage>
          -
          <lpage>613</lpage>
          . URL: https://doi.org/10.1007/s12599-021-00722-y. doi:
          <volume>10</volume>
          .1007/ S12599-021-00722-Y.
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          [53]
          <string-name>
            <given-names>J.</given-names>
            <surname>Glöckler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sedlmeir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Frank</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Fridgen</surname>
          </string-name>
          ,
          <article-title>A systematic review of identity and access management requirements in enterprises and potential contributions of self-sovereign identity</article-title>
          ,
          <source>Bus. Inf. Syst. Eng</source>
          .
          <volume>66</volume>
          (
          <year>2024</year>
          )
          <fpage>421</fpage>
          -
          <lpage>440</lpage>
          . URL: https://doi.org/10.1007/s12599-023-00830-x. doi:
          <volume>10</volume>
          .1007/S12599-023-00830-X.
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          [54]
          <string-name>
            <given-names>S.</given-names>
            <surname>Chuhan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Wojnas</surname>
          </string-name>
          ,
          <article-title>Designing and evaluating a resident-centric digital wallet experience</article-title>
          , in: A.
          <string-name>
            <surname>Moallem</surname>
          </string-name>
          (Ed.),
          <source>HCI for Cybersecurity, Privacy and Trust - 5th International Conference, HCI-CPT</source>
          <year>2023</year>
          ,
          <article-title>Held as Part of the 25th HCI International Conference</article-title>
          ,
          <string-name>
            <surname>HCII</surname>
          </string-name>
          <year>2023</year>
          , Copenhagen, Denmark,
          <source>July 23-28</source>
          ,
          <year>2023</year>
          , Proceedings, volume
          <volume>14045</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2023</year>
          , pp.
          <fpage>591</fpage>
          -
          <lpage>609</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>031</fpage>
          -35822-7_
          <fpage>38</fpage>
          . doi:
          <volume>10</volume>
          .1007/ 978-3-
          <fpage>031</fpage>
          -35822-7\_
          <fpage>38</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          [55]
          <string-name>
            <given-names>M.</given-names>
            <surname>Teuschel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Pöhn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Grabatin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Dietz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Hommel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Alt</surname>
          </string-name>
          , '
          <article-title>don't annoy me with</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>