{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:33:50Z","timestamp":1725536030276},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642033148"},{"type":"electronic","value":"9783642033155"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03315-5_11","type":"book-chapter","created":{"date-parts":[[2009,7,25]],"date-time":"2009-07-25T03:15:46Z","timestamp":1248491746000},"page":"151-159","source":"Crossref","is-referenced-by-count":1,"title":["An Overview of Electronic Passport Security Features"],"prefix":"10.1007","author":[{"given":"Zden\u011bk","family":"\u0158\u00edha","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"BSI: Advanced Security Mechanisms for Machine Readable Travel Documents \u2013 Extended Access Control (EAC), Version 1.11, TR-03110"},{"key":"11_CR2","unstructured":"Hlav\u00e1\u010d, M., Rosa, T.: A Note on the Relay Attacks on e-passports? The Case of Czech e-passports. Tech. report 2007\/244, Int\u2019l Assoc. for Cryptologic Research (2007), http:\/\/eprint.iacr.org\/2007\/244.pdf"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/11908739_11","volume-title":"Advances in Information and Computer Security","author":"J.-H. Hoepman","year":"2006","unstructured":"Hoepman, J.-H., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R.W.: Crossing Borders: Security and Privacy Issues of the European e-Passport. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol.\u00a04266, pp. 152\u2013167. Springer, Heidelberg (2006), http:\/\/www.cs.ru.nl\/~jhh\/publications\/passport.pdf"},{"key":"11_CR4","unstructured":"ICAO, Document 9303, Edition 6 Part 1, Part 2 and Part 3"},{"key":"11_CR5","unstructured":"Kirschenbaum, I., Wool, A.: How to Build a Low-Cost, Extended-Range RFID Skimmer, http:\/\/www.eng.tau.ac.il\/~yash\/kw-usenix06\/index.html"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Kosta, E., Meints, M., Hansen, M., Gasson, M.: An analysis of security and privacy issues relating to RFID enabled ePassports. In: IFIPSEC 2007 International Federation for Information Processing, May 2007. New approaches for Security, Privacy and Trust in Complex Environments, vol.\u00a0232, pp. 467\u2013472 (2007)","DOI":"10.1007\/978-0-387-72367-9_42"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"K\u00fcgler, D., Naumann, I.: Sicherheitsmechanismen f\u00fcr kontaktlose Chips im deutschen Reisepass. Ein \u00dcberblick \u00fcber Sicherheitsmerkmale, Risiken und Gegenma\u00dfnahmen. Datenschutz und Datensicherheit (March 2007), http:\/\/www.bsi.de\/fachthem\/epass\/dud_03_2007_kuegler_naumann.pdf","DOI":"10.1007\/s11623-007-0066-4"},{"key":"11_CR8","unstructured":"Richter, H., Mostowski, W., Poll, E.: Fingerprinting Passports. In: NLUUG 2008 Spring Conference on Security, pp. 21\u201330 (2008), http:\/\/www.cs.ru.nl\/~erikpoll\/papers\/nluug.pdf"},{"key":"11_CR9","unstructured":"\u0158\u00edha, Z.: Bezpe\u010dnost elektronick\u00fdch pas\u016f, \u010d\u00e1st I. Crypto-World 10\/2006, http:\/\/www.crypto-world.info"},{"key":"11_CR10","unstructured":"Witteman, M.: Attacks on Digital Passports, WhatTheHack Conference, http:\/\/wiki.whatthehack.org\/images\/2\/28\/WTH-slides-Attacks-on-Digital-Passports-Marc-Witteman.pdf"},{"key":"11_CR11","unstructured":"Wikipedia: German entry for \u2018Reisepass\u2019, http:\/\/de.wikipedia.org\/wiki\/Reisepass"}],"container-title":["IFIP Advances in Information and Communication Technology","The Future of Identity in the Information Society"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03315-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T13:52:43Z","timestamp":1558446763000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03315-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642033148","9783642033155"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03315-5_11","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}