{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:54:14Z","timestamp":1742950454193,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319983486"},{"type":"electronic","value":"9783319983493"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98349-3_5","type":"book-chapter","created":{"date-parts":[[2018,7,28]],"date-time":"2018-07-28T15:04:39Z","timestamp":1532790279000},"page":"60-70","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Key Factors in Coping with Large-Scale Security Vulnerabilities in the eID Field"],"prefix":"10.1007","author":[{"given":"Silvia","family":"Lips","sequence":"first","affiliation":[]},{"given":"Ingrid","family":"Pappel","sequence":"additional","affiliation":[]},{"given":"Valentyna","family":"Tsap","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Draheim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,29]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Marsalek, A., Zefferer, T., Reimair, F., Karabat, \u00c7., Soykan, E.U.: Leveraging the adoption of electronic identities and electronic-signature solutions in Europe. In: Proceedings of the Symposium on Applied Computing, SAC 2017, pp. 69\u201371. ACM, New York (2017)","DOI":"10.1145\/3019612.3019885"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-319-64677-0_31","volume-title":"Electronic Government","author":"LF Luna-Reyes","year":"2017","unstructured":"Luna-Reyes, L.F., Sandoval-Almazan, R., Puron-Cid, G., Picazo-Vela, S., Luna, D.E., Gil-Garcia, J.R.: Understanding public value creation in the delivery of electronic services. In: Janssen, M., et al. (eds.) EGOV 2017. LNCS, vol. 10428, pp. 378\u2013385. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64677-0_31"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Muldme, A., Pappel, I., Lauk, M., Draheim, D.: A survey on customer satisfaction in national electronic ID user support. In: 2018 International Conference on eDemocracy eGovernment (ICEDEG), pp. 31\u201337, April 2018","DOI":"10.1109\/ICEDEG.2018.8372374"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-319-70004-5_33","volume-title":"Future Data and Security Engineering","author":"V Tsap","year":"2017","unstructured":"Tsap, V., Pappel, I., Draheim, D.: Key success factors in introducing national e-identification systems. In: Dang, T.K., Wagner, R., K\u00fcng, J., Thoai, N., Takizawa, M., Neuhold, E.J. (eds.) FDSE 2017. LNCS, vol. 10646, pp. 455\u2013471. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70004-5_33"},{"key":"5_CR5","unstructured":"Republic of Estonia: Electronic identification and trust services for electronic transactions act. https:\/\/www.riigiteataja.ee\/en\/eli\/527102016001\/"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-662-56266-6_2","volume-title":"Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI","author":"I Pappel","year":"2017","unstructured":"Pappel, I., Pappel, I., Tepandi, J., Draheim, D.: Systematic digital signing in estonian e-government processes. In: Hameurlain, A., K\u00fcng, J., Wagner, R., Dang, T.K., Thoai, N. (eds.) Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI. LNCS, vol. 10720, pp. 31\u201351. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-56266-6_2"},{"key":"5_CR7","unstructured":"European Union: Regulation (EU) no. 910\/2014 of the European Parliament and of the council of 23 july 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing directive 1999\/93\/EC (2014)"},{"key":"5_CR8","unstructured":"Republic of Estonia: Identity documents act. https:\/\/www.riigiteataja.ee\/en\/eli\/521062017003\/"},{"key":"5_CR9","unstructured":"Republic of Estonia: Aliens act. https:\/\/www.riigiteataja.ee\/en\/eli\/501112017003\/"},{"key":"5_CR10","unstructured":"E-Governance Adacemy: e-Estonia - e-governance in practice. eGA, Tallinn (2016). https:\/\/goo.gl\/JfpwNN"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Nemec, M., Sys, M., Svenda, P., Klinec, D., Matyas, V.: The return of coppersmith\u2019s attack: practical factorization of widely used RSA moduli. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, pp. 1631\u20131648. ACM, New York (2017)","DOI":"10.1145\/3133956.3133969"},{"key":"5_CR12","unstructured":"Svenda, P., et al.: The million-key question - investigating the origins of RSA public keys. In: 25th USENIX Security Symposium, pp. 893\u2013910. USENIX Association (2017)"},{"key":"5_CR13","unstructured":"Prvn\u00ed certifika\u010dn\u00ed autorita: Safety of starcos cards. I.CA News Feed, November 2017. http:\/\/www.ica.cz\/News?IdNews=363"},{"key":"5_CR14","unstructured":"Meyer, D.: ID card security - Spain is facing chaos over chip crypto flaws. ZDNet, November 2017. https:\/\/goo.gl\/8xWizW"},{"key":"5_CR15","unstructured":"Leyden, J.: Confusion reigns over crypto vuln in Spanish electronic ID smartcards - certs revoked, but where are the updates? The register, November 2017"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Paide, K., Pappel, I., Vainsalu, H., Draheim, D.: On the systematic exploitation of the Estonian data exchange layer X-road for strengthening public private partnerships. In: 11th International Conference on Theory and Practice of Electronic Governance, ICEGOV 2018. ACM (2018)","DOI":"10.1145\/3209415.3209441"},{"key":"5_CR17","unstructured":"British Standards Institution: Business continuity management - part 1: code of practice, British Standard BS 259991:2006. BSI Group, London (2006)"},{"key":"5_CR18","unstructured":"British Standards Institution: Societal security - business continuity management systems - requirements. BSI Group, London (2014)"},{"key":"5_CR19","unstructured":"Draheim, D.: Smart business process management. In: 2011 BPM and Workflow Handbook, Digital Edition. Future Strategies, Workflow Management Coalition, pp. 207\u2013223 (2012)"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Draheim, D., Pirinen, R.: Towards exploiting social software for business continuity management. In: Workshops on Database and Expert Systems Applications (DEXA), pp. 279\u2013283. IEEE Press, September 2011","DOI":"10.1109\/DEXA.2011.81"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/978-3-319-58460-7_31","volume-title":"Human Aspects of Information Security, Privacy and Trust","author":"A Buldas","year":"2017","unstructured":"Buldas, A., Saarepera, M.: Are the current system engineering practices sufficient to meet cyber crime? In: Tryfonas, T. (ed.) HAS 2017. LNCS, vol. 10292, pp. 451\u2013463. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-58460-7_31"}],"container-title":["Lecture Notes in Computer Science","Electronic Government and the Information Systems Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98349-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:35:16Z","timestamp":1710261316000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-98349-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319983486","9783319983493"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98349-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"29 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EGOVIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Electronic Government and the Information Systems Perspective","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Regensburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"egov2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/egovis2018","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confdriver","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"86% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,45","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,45","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}