{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:56:00Z","timestamp":1725562560873},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642149917"},{"type":"electronic","value":"9783642149924"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14992-4_9","type":"book-chapter","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T08:42:07Z","timestamp":1281343327000},"page":"94-104","source":"Crossref","is-referenced-by-count":2,"title":["Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports"],"prefix":"10.1007","author":[{"given":"Vincenzo","family":"Auletta","sequence":"first","affiliation":[]},{"given":"Carlo","family":"Blundo","sequence":"additional","affiliation":[]},{"given":"Angelo","family":"De Caro","sequence":"additional","affiliation":[]},{"given":"Emiliano","family":"De Cristofaro","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Persiano","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Visconti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Advanced security mechanisms for Machine Readable Travel Documents - Extended Access Control, http:\/\/www.bsi.bund.de\/fachthem\/epass\/EACTR03110_v110.pdf"},{"key":"9_CR2","unstructured":"BACK User Guide, http:\/\/rfid.dia.unisa.it\/epass\/UserGuide.pdf"},{"key":"9_CR3","unstructured":"Benefits of MRTD, http:\/\/mrtd.icao.int\/content\/view\/28\/203\/"},{"key":"9_CR4","unstructured":"NIST Statistical Test Suite, http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/rng\/documents\/sts-2.0b.zip"},{"key":"9_CR5","unstructured":"NIST Statistical Test Suite Documentation, http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-22-rev1\/SP800-22rev1.pdf"},{"key":"9_CR6","unstructured":"Privacy issues with new digital passport, http:\/\/www.riscure.com\/news\/passport.html"},{"key":"9_CR7","unstructured":"Random Number Generation Technical Working Group, http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/rng\/index.html"},{"key":"9_CR8","unstructured":"Security features and biometrics in passports, http:\/\/www.europarl.europa.eu\/sides\/getDoc.do?language=EN&type=IM-PRESS&reference=20090114IPR46171"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-85230-8_11","volume-title":"Financial Cryptography and Data Security","author":"G. Avoine","year":"2008","unstructured":"Avoine, G., Kalach, K., Quisquater, J.: E-Passport: Securing international contacts with contactless chips. In: Tsudik, G. (ed.) FC 2008. LNCS, vol.\u00a05143, pp. 141\u2013155. Springer, Heidelberg (2008)"},{"key":"9_CR10","unstructured":"Avoine, G., Kalach, K., Quisquater, J.-J.: Belgian biometric passport does not get a pass...your personal data are in danger!, http:\/\/www.dice.ucl.ac.be\/crypto\/passport\/index.html"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-85230-8_11","volume-title":"Financial Cryptography and Data Security","author":"G. Avoine","year":"2008","unstructured":"Avoine, G., Kalach, K., Quisquater, J.-J.: epassport: Securing international contacts with contactless chips. In: Tsudik, G. (ed.) FC 2008. LNCS, vol.\u00a05143, pp. 141\u2013155. Springer, Heidelberg (2008)"},{"key":"9_CR12","unstructured":"Blundo, C., Persiano, G., Sadeghi, A., Visconti, I.: Identification protocols revisited -episode i: E-passports. In: Secure Component and System Identification, SECSI 2008 (2008)"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/978-3-540-88313-5_24","volume-title":"Computer Security - ESORICS 2008","author":"C. Blundo","year":"2008","unstructured":"Blundo, C., Persiano, G., Sadeghi, A., Visconti, I.: Improved security notions and protocols for non-transferable identification. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 364\u2013378. Springer, Heidelberg (2008)"},{"key":"9_CR14","unstructured":"Blundo, C., Persiano, G., Sadeghi, A., Visconti, I.: Resettable and non-transferable chip authentication for e-passports. In: Workshop on RFID Security (RFIDSec 2008) (2008)"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-540-71093-6_30","volume-title":"Information Security Applications","author":"D. Carluccio","year":"2007","unstructured":"Carluccio, D., Lemke-Rust, K., Paar, C., Sadeghi, A.-R.: E-passport: The global traceability or how to feel like an ups package. In: Lee, J.K., Yi, O., Yung, M. (eds.) WISA 2006. LNCS, vol.\u00a04298, pp. 391\u2013404. Springer, Heidelberg (2007)"},{"issue":"6","key":"9_CR16","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2007.164","volume":"5","author":"E. Courses","year":"2007","unstructured":"Courses, E., Surveys, T.: E-Passport Threats. IEEE Security & Privacy Magazine\u00a05(6), 61\u201364 (2007)","journal-title":"IEEE Security & Privacy Magazine"},{"key":"9_CR17","unstructured":"Avoine, G., Kalach, K., Quisquater, J.-J.: Belgian Biometric Passport does not get a pass... (2007), http:\/\/www.dice.ucl.ac.be\/crypto\/passport\/index.html"},{"key":"9_CR18","unstructured":"Grunwald, L.: New attacks against RFID-Systems (2006), http:\/\/www.blackhat.com\/presentations\/bh-usa-06\/BH-US-06-Grunwald.pdf"},{"key":"9_CR19","unstructured":"Kc, G.S., Karger, P.A.: Security and Privacy Issues in Machine Readable Travel Documents (MRTDs). RC 23575, IBM T. J. Watson Research Labs (April 2005)"},{"key":"9_CR20","unstructured":"Halvac, M., Rosa, T.: A Note on the Relay Attacks on e-passports: The Case of Czech e-Passports. Cryptology ePrint Archive, Report 2007\/244 (2007)"},{"key":"9_CR21","unstructured":"ICAO. Machine Readable Travel Documents, PKI for Machine Readable Travel Documents offering ICC Read-Only Access (2004), http:\/\/www.icao.int\/mrtd"},{"key":"9_CR22","unstructured":"H. J.H., H. E., J. B., and O.M. S.R. W"},{"key":"9_CR23","unstructured":"Juels, A., Molnar, D., Wagner, D.: Security and Privacy Issues in E-passports. Technical report"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Juels, A., Molnar, D., Wagner, D.: Security and Privacy issues in e-Passports. In: SecureComm (2005)","DOI":"10.1109\/SECURECOMM.2005.59"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Juels, A., Molnar, D., Wagner, D.: Security and privacy issues in e-passports. In: SecureComm 2005, First International Conference on Security and Privacy for Emerging Areas in Communication Networks, Athens, Greece (September 2005)","DOI":"10.1109\/SECURECOMM.2005.59"},{"key":"9_CR26","unstructured":"Kc, G., Karger, P.: Security and Privacy Issues in Machine Readable Travel Documents, MRTDs (2006)"},{"key":"9_CR27","unstructured":"Kumar, S., Paar, C., Pelzl, J., Pfeiffer, G., Rupp, A., Schimmler, M.: How to Break DES for\u00a08,980. In: SHARCS 2006 \u2013 Special-purpose Hardware for Attacking Cryptographic Systems, pp. 17\u201335 (2006), http:\/\/www.hyperelliptic.org\/tanja\/SHARCS\/talks06\/copa_sharcs.pdf"},{"key":"9_CR28","unstructured":"Laurie, A.: RFIDIOt, http:\/\/www.rfidiot.org"},{"key":"9_CR29","unstructured":"Liu, Y., Kasper, T., Lemke-Rust, K., Paar, C.: E-passport: Cracking basic access control keys with copacobana. In: SHARCS 2007 (2007)"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Lehtonen, M., Michahelles, F., Staake, T., Fleisch, E.: Strengthening the security of machine readable documents by combining rfid and optical memory devices. In: Proceedings of Int. Conf. on Ambient Intelligence Development (2006)","DOI":"10.1007\/978-2-287-47610-5_6"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Monnerat, J., Vaudenay, S., Vuagnoux, M.: About machine-readable travel documents \u2013 privacy enhancement using (weakly) non-transferable data authentication. In: International Conference on RFID Security (2007)","DOI":"10.1088\/1742-6596\/77\/1\/012006"},{"key":"9_CR32","unstructured":"Ortiz-Yepes, D.: ePassports: Authentication and Access Control Mechanisms (2007)"},{"key":"9_CR33","unstructured":"Robroch, H.: ePassport Privacy Attack, Presentation at Cards Asia Singapore (April 26, 2006), http:\/\/www.riscure.com"},{"key":"9_CR34","first-page":"61","volume-title":"E-passport threats","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S.: E-passport threats, vol.\u00a05, pp. 61\u201364. IEEE Computer Society, Los Alamitos (2007)"},{"key":"9_CR35","unstructured":"Witteman, M.: Attacks on digital passports. What the Hack"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14992-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T09:12:09Z","timestamp":1559380329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14992-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642149917","9783642149924"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14992-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}