{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:18:36Z","timestamp":1742383116858},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540689782"},{"type":"electronic","value":"9783540689799"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68979-9_6","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T12:02:26Z","timestamp":1218542546000},"page":"75-91","source":"Crossref","is-referenced-by-count":27,"title":["The Zurich Trusted Information Channel \u2013 An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Weigold","sequence":"first","affiliation":[]},{"given":"Thorsten","family":"Kramp","sequence":"additional","affiliation":[]},{"given":"Reto","family":"Hermann","sequence":"additional","affiliation":[]},{"given":"Frank","family":"H\u00f6ring","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Buhler","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Baentsch","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Weigold, T., Kramp, T., Baentsch, M.: Remote Client Authentication. IEEE Security & Privacy journal (accepted, 2008) (to be published)","key":"6_CR1","DOI":"10.1109\/MSP.2008.93"},{"unstructured":"Federal Office of Police, Swiss Reporting and Analysis Centre for Information Assurance MELANI. Semi-annual report 2007\/1, http:\/\/www.melani.admin.ch\/","key":"6_CR2"},{"unstructured":"RSA SecurityID Token, RSA Security (2007), http:\/\/www.rsa.com\/node.aspx?id=1156","key":"6_CR3"},{"issue":"4","key":"6_CR4","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1145\/1053291.1053327","volume":"48","author":"B. Schneier","year":"2005","unstructured":"Schneier, B.: Two-Factor Authentication: Too Little, Too Late. Comm. ACM\u00a048(4), 136 (2005)","journal-title":"Comm. ACM"},{"unstructured":"Schneier, B.: Fighting Fraudulent Transactions (November 27, 2006), http:\/\/www.schneier.com\/blog\/archives\/2006\/11\/fighting_fraudu.html","key":"6_CR5"},{"unstructured":"Federal Office for Information Security. The IT Security Situation in Germany (2007), http:\/\/www.bsi.de\/english\/publications\/securitysituation\/Lagebericht_2007_englisch.pdf","key":"6_CR6"},{"unstructured":"The FINREAD (FINancial Transactional IC Card READer) project,http:\/\/www.finread.com","key":"6_CR7"},{"issue":"2","key":"6_CR8","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MSP.2006.50","volume":"4","author":"A. Hiltgen","year":"2006","unstructured":"Hiltgen, A., Kramp, T., Weigold, T.: Secure Internet Banking Authentication. IEEE Security & Privacy\u00a04(2), 21\u201329 (2006)","journal-title":"IEEE Security & Privacy"},{"unstructured":"AXSionics AG. The Internet Passport, http:\/\/www.axsionics.ch","key":"6_CR9"},{"unstructured":"Giesecke & Devrient GmbH. Internet Smart Card Technologie, http:\/\/www.gi-de.com\/portal\/page?_pageid=36,53930&_dad=portal&_schema=PORTAL","key":"6_CR10"},{"unstructured":"Kobil Systems. mIDentity Mobile Banking, http:\/\/www.kobil.de\/fileadmin\/download\/products\/ONLNEFLYER-MIDENTITY-MOBILEBANKING_1V00_20060420_DE.PDF","key":"6_CR11"},{"unstructured":"Hines, M.: Malware flood driving new AV: InfoWorld (December 14, 2007), http:\/\/www.infoworld.com\/article\/07\/12\/14\/Malware-flood-driving-new-AV_1.html","key":"6_CR12"}],"container-title":["Lecture Notes in Computer Science","Trusted Computing - Challenges and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68979-9_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:30:49Z","timestamp":1605763849000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68979-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540689782","9783540689799"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68979-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}