{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:33:18Z","timestamp":1725489198675},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540734079"},{"type":"electronic","value":"9783540734086"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73408-6_17","type":"book-chapter","created":{"date-parts":[[2007,8,13]],"date-time":"2007-08-13T13:23:01Z","timestamp":1187011381000},"page":"236-247","source":"Crossref","is-referenced-by-count":2,"title":["Two Worlds, One Smart Card: An Integrated Solution for Physical Access and Logical Security Using PKI on a Single Smart Card"],"prefix":"10.1007","author":[{"given":"Jaap-Henk","family":"Hoepman","sequence":"first","affiliation":[]},{"given":"Geert","family":"Kleinhuis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Community framework for electronic signatures, Directive, 1999\/93\/EC (1999)"},{"key":"17_CR2","unstructured":"Adams, C., Lloyd, S.: Understanding Public-Key Infrastructures. SAMS (1999)"},{"key":"17_CR3","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s10550-006-0009-x","volume":"23","author":"M. Becker","year":"2005","unstructured":"Becker, M., Drew, M.: Overcoming the challenges in deploying user provisioning\/identity access management backbone. BT Technical Journal\u00a023, 4 (2005)","journal-title":"BT Technical Journal"},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1023\/A:1011132312956","volume":"16","author":"C. Ellison","year":"2000","unstructured":"Ellison, C., Schneier, B.: Ten risks of pki: What you\u2019re not being told about public key infrastructure. Computer Security Journal\u00a016, 1 (2000)","journal-title":"Computer Security Journal"},{"key":"17_CR5","unstructured":"Gelbord, B., Kleinhuis, G.: On the use of pki in a residential gateway environment. In: ICWI 2003, pp.\u00a01125\u20131128 (2003)"},{"key":"17_CR6","unstructured":"Hamilton, B.A.: Convergence of enterprise security organisations (2005)"},{"key":"17_CR7","unstructured":"IETF. RFC 3280, Internet X.509 public key infrasturcture. Tech. rep (2002)"},{"issue":"9","key":"17_CR8","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B. Neuman","year":"1994","unstructured":"Neuman, B., Ts\u2019o, T.: Kerberos: an authentication service for computer networks. IEEE Communications Magazine\u00a032, 9, 33\u201338 (1994)","journal-title":"IEEE Communications Magazine"}],"container-title":["Lecture Notes in Computer Science","Public Key Infrastructure"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73408-6_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:10:38Z","timestamp":1619518238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73408-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540734079","9783540734086"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73408-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}