{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:31:28Z","timestamp":1742913088503,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319223889"},{"type":"electronic","value":"9783319223896"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22389-6_6","type":"book-chapter","created":{"date-parts":[[2015,8,10]],"date-time":"2015-08-10T02:59:08Z","timestamp":1439175548000},"page":"71-85","source":"Crossref","is-referenced-by-count":7,"title":["Encryption-Based Second Authentication Factor Solutions for Qualified Server-Side Signature Creation"],"prefix":"10.1007","author":[{"given":"Christof","family":"Rath","sequence":"first","affiliation":[]},{"given":"Simon","family":"Roth","sequence":"additional","affiliation":[]},{"given":"Harald","family":"Bratko","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Zefferer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography (2007). \n                    http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-56A\/SP800-56A_Revision1_Mar08-2007.pdf\n                    \n                  . Accessed March 2015"},{"key":"6_CR2","unstructured":"Check Point Software Technologies Ltd.: Media Alert: Check Point and Versafe Uncover New Eurograbber Attack (2012). \n                    http:\/\/www.checkpoint.com\/press\/2012\/120512-media-alert-cp-versafe-eurograbber-attack.html"},{"issue":"6","key":"6_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976). \n                    http:\/\/dx.doi.org\/10.1109\/TIT.1976.1055638","journal-title":"IEEE Trans. Inf. Theory"},{"key":"6_CR4","unstructured":"Fairchild, A., de Vuyst, B.: The Evolution of the e-ID card in Belgium: Data Privacy and Multi-Application Usage. In: The Sixth International Conference on Digital Society, pp. 13\u201316. Valencia (2012)"},{"key":"6_CR5","unstructured":"Leitold, H., Hollosi, A., Posch, R.: Security Architecture of the Austrian Citizen Card Concept. In: 18th Annual Computer Security Applications Conference, 2002, Proceedings, pp. 391\u2013400 (2002)"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-642-39235-1_9","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"C Mulliner","year":"2013","unstructured":"Mulliner, C., Borgaonkar, R., Stewin, P., Seifert, J.-P.: SMS-based one-time passwords: attacks and defense (short paper). In: Rieck, K., Stewin, P., Seifert, J.-P. (eds.) DIMVA 2013. LNCS, vol. 7967, pp. 150\u2013159. Springer, Heidelberg (2013)"},{"key":"6_CR7","unstructured":"National Institute of Standards and Technology: Advanced Encryption Standard (AES) (2001). \n                    http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"6_CR8","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-642-15257-3_10","volume-title":"Security and Privacy \u2013 Silver Linings in the Cloud","author":"C Orthacker","year":"2010","unstructured":"Orthacker, C., Centner, M., Kittl, C.: Qualified mobile server signature. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds.) SEC 2010. IFIP AICT, vol. 330, pp. 103\u2013111. Springer, Heidelberg (2010)"},{"key":"6_CR9","unstructured":"Rath, C., Roth, S., Schallar, M., Zefferer, T.: A secure and flexible server-based mobile eID and e-signature solution. In: Proceedings of the 8th International Conference on Digital Society, ICDS 2014, Barcelona, Spain. pp. 7\u201312. IARIA (2014)"},{"key":"6_CR10","unstructured":"The European Parliament and the Council of the European Union: DIRECTIVE 1999\/93\/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 13 December 1999 on a Community framework for electronic signatures (1999). \n                    http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=OJ:L:2000:013:0012:0020:EN:PDF"},{"key":"6_CR11","unstructured":"Zefferer, T., Krnjic, V.: Usability evaluation of electronic signature based E-Government solutions. In: Proceedings of the IADIS International Conference WWW\/INTERNET 2012, pp. 227\u2013234 (2012)"}],"container-title":["Lecture Notes in Computer Science","Electronic Government and the Information Systems Perspective"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22389-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T11:26:59Z","timestamp":1559215619000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-22389-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319223889","9783319223896"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22389-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}