{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:29:06Z","timestamp":1725470946399},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540383413"},{"type":"electronic","value":"9783540383437"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11836810_18","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T06:36:57Z","timestamp":1159857417000},"page":"246-256","source":"Crossref","is-referenced-by-count":0,"title":["Using Multiple Smart Cards for Signing Messages at Malicious Terminals"],"prefix":"10.1007","author":[{"given":"Istv\u00e1n Zsolt","family":"Berta","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","volume-title":"Theoretical Aspects of Computer Software","author":"M. Abadi","year":"1992","unstructured":"Abadi, M., Burrows, M., Kaufman, C., Lampson, B.: Authentication and Delegation with Smart-cards. In: Ito, T., Meyer, A.R. (eds.) TACS 1991. LNCS, vol.\u00a0526, Springer, Heidelberg (1992)"},{"key":"18_CR2","unstructured":"Schneier, B., Shostack, A.: Breaking up is Hard to do: Modelling security threats for smart cards. USENIX Workshop on Smart Card Technology, Chicago, Illinois, USA (1999), http:\/\/www.counterpane.com\/smart-card-threats.html"},{"key":"18_CR3","unstructured":"Balfanz, D., Felten, E.: Hand-Held Computers Can Be Better Smart Cards. In: Proceedings of USENIX Security 1999, Washington, DC (1999)"},{"key":"18_CR4","unstructured":"Gobioff, H., Smith, S., Tygar, J.D.: Smart Cards in Hostile Environments. In: Proceedings of the 2nd USENIX Workshop on Electronic Commerce, November 1996, 23-28 (1996)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Clarke, D., Gassend, B., Kotwal, T., Burnside, M., Dijk, M.v., Devadas, S., Rivest, R.: The Untrusted Computer Problem and Camera-Based Authentication (2002)","DOI":"10.1007\/3-540-45866-2_10"},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1007\/BFb0052245","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"M. Naor","year":"1997","unstructured":"Naor, M., Pinkas, B.: Visual Authentication and Identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 322\u2013336. Springer, Heidelberg (1997)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Matsumoto, T.: Human-Computer cryptography: An attempt. In: ACM Conference on Computer and Communications Security, pp. 68\u201375 (1996)","DOI":"10.1145\/238168.238190"},{"key":"18_CR8","unstructured":"Schneier, B.: The Solitaire Encryption Algorithm (1999), http:\/\/www.counterpane.com\/solitaire.htm"},{"key":"18_CR9","unstructured":"Stabell-Kulo, T., Arild, R., Myrvang, P.: Providing Authentication to Messages Signed with a Smart Card in Hostile Environments. In: Usenix Workshop on Smart Card Technology, Chicago, Illinois, USA (May 10-11, 1999)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Asokan, N., Debar, H., Steiner, M., Waidner, M.: Authenticating Public Terminals. In: Computer Networks 1999 (1999)","DOI":"10.1016\/S1389-1286(98)00020-6"},{"key":"18_CR11","first-page":"1","volume":"29","author":"I.Z. Berta","year":"2004","unstructured":"Berta, I.Z., Vajda, I.: Limitations of humans at malicious terminals. Tatra Mountains Mathematical Publications\u00a029, 1\u201316 (2004)","journal-title":"Tatra Mountains Mathematical Publications"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Berta, I.Z., Butty\u00dfn, L., Vajda, I.: Privacy protecting protocols for revokable signatures. In: Cardis 2004, Toulouse, France (2004)","DOI":"10.1007\/1-4020-8147-2_5"},{"issue":"3","key":"18_CR13","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1109\/TDSC.2005.28","volume":"2","author":"I.Z. Berta","year":"2005","unstructured":"Berta, I.Z., Butty\u00dfn, L., Vajda, I.: A framework for the revocation of unintended digital signatures initiated by malicious terminals. IEEE Transactions on Secure and Dependable Computing\u00a02(3), 268\u2013272 (2005)","journal-title":"IEEE Transactions on Secure and Dependable Computing"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Gruschka, N., Reuter, F., Luttenberger, N.: Checking and Signing XML Using Java Smart Cards. In: CARDIS 2004, Tolouse, France (2004)","DOI":"10.1007\/1-4020-8147-2_19"},{"key":"18_CR15","unstructured":"Girard, P., Giraud, J., Gauteron, L.: Secure electronic signatures when Trojan Horses are lurking. In: e-smart 2004, Sophia Antipolis (2004)"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Berta, I.Z., Vajda, I.: Documents from Malicious Terminals. In: SPIE Microtechnologies for the New Millenium 2003, Bioengineered and Bioinspired Systems, Spain (2003)","DOI":"10.1117\/12.498617"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/3-540-60922-9_32","volume-title":"STACS 96","author":"U. Maurer","year":"1996","unstructured":"Maurer, U.: A Unified and Generalized Treatment of Authentication Theory. In: Puech, C., Reischuk, R. (eds.) STACS 1996. LNCS, vol.\u00a01046, pp. 387\u2013398. Springer, Heidelberg (1996)"},{"key":"18_CR18","unstructured":"S\u00dfnta, r.: Smart Card based Application for Message Authentication in a Malicious Terminal Environment. Master\u2019s Thesis, Fachhochschule Darmstadt (2004)"},{"key":"18_CR19","unstructured":"Schneier, B.: Attack Trees. Dr. Dobb\u2019s Journal (December 1999), http:\/\/www.schneier.com\/paper-attacktrees-ddj-ft.html"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11836810_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:19:40Z","timestamp":1605626380000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11836810_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540383413","9783540383437"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11836810_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}