{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:57:35Z","timestamp":1743134255957,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319702896"},{"type":"electronic","value":"9783319702902"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-70290-2_11","type":"book-chapter","created":{"date-parts":[[2017,11,3]],"date-time":"2017-11-03T14:58:05Z","timestamp":1509721085000},"page":"175-191","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Using the Estonian Electronic Identity Card for\u00a0Authentication to a Machine"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0459-6580","authenticated-orcid":false,"given":"Danielle","family":"Morgan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3746-8059","authenticated-orcid":false,"given":"Arnis","family":"Parsovs","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,4]]},"reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-32946-3_3","volume-title":"Financial Cryptography and Data Security","author":"J Bonneau","year":"2012","unstructured":"Bonneau, J., Preibusch, S., Anderson, R.: A birthday present every eleven wallets? The security of customer-chosen banking pins. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 25\u201340. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32946-3_3"},{"key":"11_CR2","unstructured":"Cybernetica AS: Cryptographic algorithms lifecycle report 2016. In: Cryptographic protocols over radio connection. 22 June 2016. https:\/\/www.ria.ee\/public\/RIA\/Cryptographic_Algorithms_Lifecycle_Report_2016.pdf"},{"key":"11_CR3","unstructured":"e-Governance Academy: Study on the functionality of documents in ID-1 format (in Estonian), December 2013. https:\/\/www.siseministeerium.ee\/sites\/default\/files\/dokumendid\/Uuringud\/Isikut_toendavad_dokumendid\/2013_id-1_formaadis_dokumentide_funktsionaalsuse_uuring.pdf"},{"key":"11_CR4","unstructured":"Estonian Health Insurance Fund: Digital Prescription, July 2017. https:\/\/www.haigekassa.ee\/en\/digital-prescription"},{"key":"11_CR5","unstructured":"Estonian Information System Authority: Electronic Identity Application Guide: ID card as an entrance card, May 2014. https:\/\/eid.eesti.ee\/index.php\/ID_card_as_an_entrance_card"},{"key":"11_CR6","unstructured":"Estonian Information System Authority: Electronic Identity Application Guide: Using ID-card as a loyalty card, May 2014. https:\/\/eid.eesti.ee\/index.php\/Using_ID-card_as_a_loyalty_card"},{"key":"11_CR7","unstructured":"Estonian Police and Border Guard Board: Online identity document validity check, May 2017. https:\/\/www.politsei.ee\/en\/teenused\/inquiries\/"},{"key":"11_CR8","unstructured":"Estonian Police and Border Guard Board: Residence card, May 2017. https:\/\/www.politsei.ee\/en\/nouanded\/residence-card.dot"},{"key":"11_CR9","unstructured":"Giesecke & Devrient: Sm@rtCaf\u00e9 Expert operating systems: Sm@rtCaf\u00e9 Expert 6.0, February 2013. https:\/\/www.gd.gd\/gd_media\/media\/en\/documents\/brochures\/mobile_security_2\/nb\/SmartCafe-Expert.pdf"},{"key":"11_CR10","unstructured":"GlobalPlatform Inc.: GlobalPlatform Card Specification, Version 2.1.1, March 2013. http:\/\/www.win.tue.nl\/pinpasjc\/docs\/Card%20Spec%20v2.1.1%20v0303.pdf"},{"key":"11_CR11","unstructured":"International Civil Aviation Organization: DOC 9303. Machine Readable Travel Documents. Part 11: Security Mechanisms for MRTDs (2015). https:\/\/www.icao.int\/publications\/Documents\/9303_p11_cons_en.pdf"},{"key":"11_CR12","unstructured":"Joandi, E., Kuusik, A., Tammet, T.: Analysis of potential RFID usage in the context of extending Estonian ID-card (in Estonian), January 2008. https:\/\/www.mkm.ee\/sites\/default\/files\/rfid_id_analyys_-_koopia.doc"},{"key":"11_CR13","unstructured":"Krebs, B.: Chip & PIN vs. Chip & Signature, October 2014. http:\/\/krebsonsecurity.com\/2014\/10\/chip-pin-vs-chip-signature\/"},{"key":"11_CR14","unstructured":"Lehmann, A.: New Generation of eID Smartcard, 06 November 2014. https:\/\/sk.ee\/upload\/files\/AK2014_New%20Generation%20of%20eID%20Smartcard_Andreas%20Lehmann.pdf"},{"key":"11_CR15","unstructured":"Morgan, D.: Security of Loyalty Cards Used in Estonia. MSc thesis, Tallinn University of Technology (2017). http:\/\/kodu.ut.ee\/~arnis\/loyalty_thesis.pdf"},{"key":"11_CR16","unstructured":"Morgan, D., Parsovs, A.: Using the Estonian Electronic Identity Card for Authentication to a Machine (Extended Version). Cryptology ePrint Archive, Report 2017\/880 (2017). http:\/\/eprint.iacr.org\/2017\/880"},{"key":"11_CR17","unstructured":"Murdoch, S.J.: Do you know what you\u2019re paying for? How contactless cards are still vulnerable to relay attack, August 2016. https:\/\/www.benthamsgaze.org\/2016\/08\/02\/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack\/"},{"key":"11_CR18","unstructured":"NIST: FIPS PUB 201\u20132: Personal Identity Verification (PIV) of Federal Employees and Contractors, August 2013. http:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.201-2.pdf"},{"key":"11_CR19","unstructured":"Paljak, M.: FakeEstEID JavaCard applet, 16 January 2015. https:\/\/github.com\/martinpaljak\/esteid-applets\/blob\/master\/docs\/FakeEstEID.md"},{"key":"11_CR20","unstructured":"Paljak, M.: Off-line ID card (in Estonian), 18 October 2016. http:\/\/kliendikaart.publicon.ee\/userfiles\/RIA\/idkaart\/Martin_Paljak.pdf"},{"key":"11_CR21","unstructured":"Postimees: No plans to connect Kaubamaja Partnercard with ID-card (in Estonian), 5 August 2011. http:\/\/www.postimees.ee\/521494\/partnerkaarti-id-kaardiga-uhendada-ei-kavatse"},{"key":"11_CR22","unstructured":"Postimees: The new ID-cards will be refused (in Estonian), 23 January 2015. http:\/\/tarbija24.postimees.ee\/3067299\/uued-id-kaardid-voivad-torkuda"},{"key":"11_CR23","unstructured":"Postimees: Contactless Estonian ID-card has been built (in Estonian), 5 March 2016. http:\/\/tehnika.postimees.ee\/3607697\/video-valminud-on-kontaktivaba-eesti-id-kaart"},{"key":"11_CR24","unstructured":"Riigi Teataja: Identity Documents Act (2000). https:\/\/www.riigiteataja.ee\/en\/eli\/504112013003\/consolide\/current"},{"key":"11_CR25","unstructured":"Roland, M., Hlzl, M.: Evaluation of Contactless Smartcard Antennas, June 2015. https:\/\/arxiv.org\/abs\/1507.06427"},{"key":"11_CR26","unstructured":"SecureIDNews: Defense Department order RF shields from National Laminating, November 2010. https:\/\/www.secureidnews.com\/news-item\/defense-department-order-rf-shields-from-national-laminating\/"},{"key":"11_CR27","unstructured":"SK ID Solutions AS: Cards for testing 01 July 2017. https:\/\/sk.ee\/en\/services\/testcard\/"},{"key":"11_CR28","unstructured":"Smartcard Focus: Giesecke & Devrient: SmartCafe Expert 6.0 80K Dual, 11 April 2017. https:\/\/www.smartcardfocus.com\/shop\/ilp\/id~684\/smartcafe-expert-6-0-80k-dual-\/p\/index.shtml"},{"key":"11_CR29","unstructured":"The European Parliament, the Council of the European Union: Regulation 910\/2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/EC (2014)"},{"key":"11_CR30","unstructured":"Tr\u00fcb Baltic AS: EstEID v3.4 card specification, 11 June 2012. http:\/\/www.id.ee\/public\/TB-SPEC-EstEID-Chip-App-v3.4.pdf"},{"key":"11_CR31","unstructured":"Tr\u00fcb Baltic AS: EstEID v3.5 card specification, 14 March 2017. http:\/\/www.id.ee\/public\/TB-SPEC-EstEID-Chip-App-v3.5-20170314.pdf"}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-70290-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:15:32Z","timestamp":1710267332000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-70290-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319702896","9783319702902"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-70290-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"4 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NordSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nordic Conference on Secure IT Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tartu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Estonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 November 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nordsec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nordsec2017.cs.ut.ee\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}