{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:54:31Z","timestamp":1743044071674,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030105907"},{"type":"electronic","value":"9783030105914"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:00:00Z","timestamp":1610668800000},"content-version":"vor","delay-in-days":14,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This chapter is devoted to the design and implementation of electronic ID (eID) such as ePassports and electronic personal identity documents. We present an overview of existing and emerging concepts, both concerning threats and possible countermeasures. Thereby we aim to shed light on the development of ubiquitous systems, where many artifacts will require strong electronic identification with similar properties to those in the case of eIDs issued for humans.<\/jats:p>","DOI":"10.1007\/978-3-030-10591-4_5","type":"book-chapter","created":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T14:06:41Z","timestamp":1610633201000},"page":"81-97","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["ePassport and eID Technologies"],"prefix":"10.1007","author":[{"given":"Lucjan","family":"Hanzlik","sequence":"first","affiliation":[]},{"given":"Miros\u0142aw","family":"Kuty\u0142owski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,15]]},"reference":[{"key":"5_CR72","doi-asserted-by":"crossref","unstructured":"Jens Bender, Marc Fischlin, and Dennis K\u00fcgler. Security analysis of the PACE key-agreement protocol. In Pierangela Samarati, Moti Yung, Fabio Martinelli, and Claudio Agostino Ardagna, editors, Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7\u20139, 2009. Proceedings, volume 5735 of Lecture Notes in Computer Science, pages 33\u201348. Springer, 2009.","DOI":"10.1007\/978-3-642-04474-8_3"},{"key":"5_CR73","doi-asserted-by":"crossref","unstructured":"Jens Bender, Marc Fischlin, and Dennis K\u00fcgler. The PACE|CA Protocol for Machine Readable Travel Documents. In Roderick Bloem and Peter Lipp, editors, Trusted Systems, volume 8292 of Lecture Notes in Computer Science, pages 17\u201335. Springer International Publishing, 2013.","DOI":"10.1007\/978-3-319-03491-1_2"},{"key":"5_CR153","first-page":"58","volume":"2011","author":"Jean-Sbastien Coron","year":"2011","unstructured":"Jean-Sbastien Coron, Aline Gouget, Thomas Icart, and Pascal Paillier. Supplemental access control (pace v2): Security analysis of pace integrated mapping. IACR Cryptology ePrint Archive, 2011:58, 2011.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"5_CR257","doi-asserted-by":"crossref","unstructured":"Lucjan Hanzlik, \u0141ukasz Krzywiecki, and Miros\u0142aw Kuty\u0142owski. Simplified PACE|AA protocol. In Robert H. Deng and Tao Feng, editors, Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Lanzhou, China, May 12\u201314, 2013. Proceedings, volume 7863 of Lecture Notes in Computer Science, pages 218\u2013232. Springer, 2013.","DOI":"10.1007\/978-3-642-38033-4_16"},{"key":"5_CR291","unstructured":"ICAO. Machine Readable Travel Documents - Part 11: Security Mechanism for MRTDs. Doc 9303, 2015."},{"key":"5_CR298","unstructured":"ISO\/IEC. ISO\/IEC JTC1 SC17 WG3\/TF5 for ICAO: Supplemental Access Control for Machine Readable Travel Documents v1.1. Technical Report, April 15 2014."},{"key":"5_CR349","doi-asserted-by":"crossref","unstructured":"Przemys\u0142aw Kubiak and Miros\u0142aw Kuty\u0142owski. Supervised usage of signature creation devices. In Dongdai Lin, Shouhuai Xu, and Moti Yung, editors, Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27\u201330, 2013, Revised Selected Papers, volume 8567 of Lecture Notes in Computer Science, pages 132\u2013149. Springer, 2013.","DOI":"10.1007\/978-3-319-12087-4_9"},{"key":"5_CR375","unstructured":"Yifei Liu, Timo Kasper, Kerstin Lemke-Rust, and Christof Paar. E-passport: Cracking basic access control keys. In Robert Meersman and Zahir Tari, editors, On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25\u201330, 2007, Proceedings, Part II, volume 4804 of Lecture Notes in Computer Science, pages 1531\u20131547. Springer, 2007."},{"key":"5_CR546","unstructured":"The European Parliament and the Council of the European Union. Regulation (EU) No 910\/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/ec. Available at: http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=uriserv:OJ.L_.2014.257.01.0073.01.ENG, 2014."}],"container-title":["Security of Ubiquitous Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-10591-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,17]],"date-time":"2023-10-17T17:42:06Z","timestamp":1697564526000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-10591-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030105907","9783030105914"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-10591-4_5","relation":{},"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"15 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}