{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T18:36:44Z","timestamp":1761763004711},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319130651"},{"type":"electronic","value":"9783319130668"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13066-8_11","type":"book-chapter","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T23:26:21Z","timestamp":1416007581000},"page":"173-184","source":"Crossref","is-referenced-by-count":1,"title":["ePassport: Side Channel in the Basic Access Control"],"prefix":"10.1007","author":[{"given":"Luigi","family":"Sportiello","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,15]]},"reference":[{"key":"11_CR1","unstructured":"International Civil Aviation Organization: Machine Readable Travel Documents. Part 1, vol. 1, Sixth Edition (2006)"},{"key":"11_CR2","unstructured":"International Civil Aviation Organization: Machine Readable Travel Documents. Part 1, vol. 2, Sixth Edition (2006)"},{"key":"11_CR3","unstructured":"Juels, A., Molnar, D., Wagner, D.: Security and privacy issues in e-Passports. In: Proceedings of the IEEE 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 74\u201388 (2005)"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/978-3-540-85230-8_11","volume-title":"Financial Cryptography and Data Security","author":"G Avoine","year":"2008","unstructured":"Avoine, G., Kalach, K., Quisquater, J.-J.: ePassport: Securing international contacts with contactless chips. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 141\u2013155. Springer, Heidelberg (2008)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/11908739_11","volume-title":"Advances in Information and Computer Security","author":"J-H Hoepman","year":"2006","unstructured":"Hoepman, J.-H., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R.W.: Crossing borders: Security and privacy issues of the European e-Passport. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 152\u2013167. Springer, Heidelberg (2006)"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1007\/978-3-540-76843-2_30","volume-title":"On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS","author":"Y Liu","year":"2007","unstructured":"Liu, Y., Kasper, T., Lemke-Rust, K., Paar, C.: E-Passport: Cracking basic access control keys. In: Meersman, R. (ed.) OTM 2007, Part II. LNCS, vol. 4804, pp. 1531\u20131547. Springer, Heidelberg (2007)"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/978-3-642-36140-1_9","volume-title":"Radio Frequency Identification","author":"L Sportiello","year":"2013","unstructured":"Sportiello, L.: Weakening ePassports through bad implementations. In: Hoepman, J.-H., Verbauwhede, I. (eds.) RFIDSec 2012. LNCS, vol. 7739, pp. 123\u2013136. Springer, Heidelberg (2013)"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/978-3-642-14577-3_5","volume-title":"Financial Cryptography and Data Security","author":"T Chothia","year":"2010","unstructured":"Chothia, T., Smirnov, V.: A traceability attack against e-Passports. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 20\u201334. Springer, Heidelberg (2010)"},{"key":"11_CR9","unstructured":"libnfc: Public platform independent Near Field Communication (NFC) library, Version 1.7.0 (2014). \n                    http:\/\/nfc-tools.org\/"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-3-642-41332-2_5","volume-title":"Radio Frequency Identification","author":"L Sportiello","year":"2013","unstructured":"Sportiello, L., Ciardulli, A.: Long distance relay attack. In: Hutter, M., Schmidt, J.-M. (eds.) RFIDsec 2013. LNCS, vol. 8262, pp. 69\u201385. Springer, Heidelberg (2013)"},{"key":"11_CR11","unstructured":"International Civil Aviation Organization: Supplemental Access Control for Machine Readable Travel Documents, version 1.01 (2010)"},{"key":"11_CR12","unstructured":"Commission Regulation (EU) No. 383\/2012: Laying down technical requirements with regard to driving licences which include a storage medium (microchip), 4 May 2012"},{"key":"11_CR13","unstructured":"ISO\/IEC 18013: Information Technology - Personal Identification - ISO-Compliant Driving Licence - Part 3: Access Control, Authentication and Integrity Validation (2009)"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13066-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T19:02:02Z","timestamp":1559070122000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13066-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319130651","9783319130668"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13066-8_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}