{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:04:52Z","timestamp":1725516292136},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540689782"},{"type":"electronic","value":"9783540689799"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68979-9_8","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T12:02:26Z","timestamp":1218542546000},"page":"107-118","source":"Crossref","is-referenced-by-count":0,"title":["Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI"],"prefix":"10.1007","author":[{"given":"Konstantin","family":"Hypp\u00f6nen","sequence":"first","affiliation":[]},{"given":"Marko","family":"Hassinen","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Trichina","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Juels, A., Molnar, D., Wagner, D.: Security and privacy issues in e-passports. In: Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First International Conference, pp. 74\u201388 (2005)","DOI":"10.1109\/SECURECOMM.2005.59"},{"key":"8_CR2","unstructured":"McEvoy, N.A.: e-ID as a public utility. Consult Hyperion, Guilford, UK (2007), http:\/\/www.chyp.com"},{"key":"8_CR3","unstructured":"CEN\/ISSS Workshop eAuthentication: Towards an electronic ID for the European Citizen, a strategic vision. Brussels (2004) (accessed 10.10.2007), http:\/\/europa.eu.int\/idabc\/servlets\/Doc?id=19132"},{"key":"8_CR4","first-page":"0012","volume":"013","author":"The European Parliament and the Council of the European Union","year":"2000","unstructured":"The European Parliament and the Council of the European Union: Directive 1999\/93\/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures. Official Journal L 013, pp. 0012\u20130020 (2000)","journal-title":"Official Journal L"},{"key":"8_CR5","unstructured":"Population Register Centre of Finland: What is the citizen certificate? Helsinki, Finland (2005) (accessed 10.10.2007), http:\/\/www.fineid.fi\/vrk\/fineid\/home.nsf\/en\/products"},{"key":"8_CR6","unstructured":"ICAO: PKI for machine readable travel documents offering ICC read-only access, version 1.1. Technical Report (2004)"},{"key":"8_CR7","unstructured":"Witteman, M.: Attacks on digital passports. Talk at the What The Hack conference (2005) (accessed 10.10.2007), http:\/\/wiki.whatthehack.org\/images\/2\/28\/WTH-slides-Attacks-on-Digital-Passports-Marc-Witteman.pdf"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/11908739_11","volume-title":"Advances in Information and Computer Security","author":"J.H. Hoepman","year":"2006","unstructured":"Hoepman, J.H., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R.: Crossing borders: Security and privacy issues of the european e-passport. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S. (eds.) IWSEC 2006. LNCS, vol.\u00a04266, pp. 152\u2013167. Springer, Heidelberg (2006)"},{"key":"8_CR9","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1080\/10864415.2003.11044287","volume":"8","author":"G. Roussos","year":"2003","unstructured":"Roussos, G., Peterson, D., Patel, U.: Mobile identity management: An enacted view. International Journal of Electronic Commerce\u00a08, 81\u2013100 (2003)","journal-title":"International Journal of Electronic Commerce"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MPRV.2005.30","volume":"4","author":"G. Roussos","year":"2005","unstructured":"Roussos, G., Marsh, A., Maglavera, S.: Enabling pervasive computing with smart phones. IEEE Pervasive Computing\u00a04, 20\u201327 (2005)","journal-title":"IEEE Pervasive Computing"},{"key":"8_CR11","unstructured":"The Royal Academy of Engineering: Dilemmas of privacy and surveillance: Challenges of technological change. The Royal Academy of Engineering, 29 Great Peter Street, London, SW1P 3LW (2007)"},{"key":"8_CR12","unstructured":"ABI Research: Twenty percent of mobile handsets will include near field communication by 2012. London, UK (2007) (accessed 10.10.2007), http:\/\/www.abiresearch.com\/abiprdisplay.jsp?pressid=838"},{"key":"8_CR13","unstructured":"Java Community Process: Contactless Communication API, JSR 257, v. 1.0. Nokia Corporation, Espoo, Finland (2006) (accessed 10.10.2007), http:\/\/www.jcp.org\/en\/jsr\/detail?id=257 ."},{"key":"8_CR14","unstructured":"Java Community Process: Security and Trust Services API (SATSA) for JavaTM2 Platform, Micro Edition, v. 1.0. Sun Microsystems, Inc., Santa Clara, CA, USA (2004) (accessed 10.10.2007), http:\/\/www.jcp.org\/en\/jsr\/detail?id=177"},{"key":"8_CR15","unstructured":"IBM Zurich Research Laboratory: JCOP Tools 3.0 (Eclipse plugin). technical brief, revision 1.0 (accessed 10.10.2007), ftp:\/\/ftp.software.ibm.com\/software\/pervasive\/info\/JCOPTools3Brief.pdf"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Santesson, S., Polk, W., Barzin, P., Nystrom, M.: Internet X.509 public key infrastructure qualified certificates profile. Network Working Group, Request for Comments 3039 (2001) (accessed 10.10.2007)","DOI":"10.17487\/rfc3039"}],"container-title":["Lecture Notes in Computer Science","Trusted Computing - Challenges and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68979-9_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:30:50Z","timestamp":1605763850000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68979-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540689782","9783540689799"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68979-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}