{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:34:57Z","timestamp":1725528897900},"publisher-location":"Wiesbaden","reference-count":18,"publisher":"Vieweg+Teubner","isbn-type":[{"type":"print","value":"9783834806604"},{"type":"electronic","value":"9783834892836"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-8348-9283-6_22","type":"book-chapter","created":{"date-parts":[[2009,3,6]],"date-time":"2009-03-06T16:17:39Z","timestamp":1236356259000},"page":"208-217","source":"Crossref","is-referenced-by-count":0,"title":["Transforming Mobile Platform with KI-SIM Card into an Open Mobile Identity Tool"],"prefix":"10.1007","author":[{"given":"Konstantin","family":"Hypp\u00f6nen","sequence":"first","affiliation":[]},{"given":"Marko","family":"Hassinen","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Trichina","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Alves, Tiago; Felton, Don: TrustZone: Integrated Hardware and Software Security. Enabling Trusted Computing in Embedded Systems. ARM white paper, July 2004. http:\/\/www.arm.com\/pdfs\/TZ_Whitepaper.pdf"},{"key":"22_CR2","unstructured":"Pleumann, J\u00f6rg; Yadan, Omry: Antenna. An Ant-to-End Solution For Wireless Java. Version 1.0.1, 2008. http:\/\/antenna.sourceforge.net\/"},{"key":"22_CR3","unstructured":"The Legion of the Bouncy Castle: Java cryptography APIs. http:\/\/www.bouncycastle.org\/java.html"},{"key":"22_CR4","unstructured":"Chappell, David: Introducing Windows CardSpace. April 2006. http:\/\/msdn2.microsoft.com\/en-us\/library\/aa480189.aspx"},{"key":"22_CR5","unstructured":"ETSI: TS 102 622 V7.0.0. Smart Cards; UICC \u2014 Contactless Front-end (CLF) interface; Host Controller Interface (HCI) (Release 7). Technical specification, February 2008."},{"key":"22_CR6","unstructured":"ETSI: TS 102 613 V7.1.0. Smart Cards; UICC \u2014 Contactless Front-end (CLF) interface; Part 1: Physical and data link layer characteristics (Release 7). Technical specification, February 2008."},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Gratzer, Vanessa; Naccache, David: Trust on a Nationwide Scale. In: Gutmann, P., Naccache, D., Palmer Ch. (Eds): IEEE Security and Privacy, 2007, p. 64\u201366.","DOI":"10.1109\/MSP.2007.127"},{"key":"22_CR8","unstructured":"Hypp\u00f6nen, Konstantin: An Open Mobile Identity Tool: An Architecture for Mobile Identity Management. In: S.F. Mj\u00f8lsnes, S. Mauw, and S.K. Katsikas (Eds.): EuroPKI 2008, LNCS 5057, Springer-Verlag Berlin Heidelberg, 2008, p. 207\u2013222."},{"key":"22_CR9","unstructured":"Hypp\u00f6nen, Konstantin; Hassinen, Marko; Trichina, Elena: Combining Biometric Authentication with Privacy-Enhancing Technologies. In: P. Lipp, A.-R. Sadeghi, and K.M. Koch (Eds.): TRUST\u20192008, LNCS 4968, Springer-Verlag Berlin Heidelberg, 2008, p. 107\u2013118."},{"key":"22_CR10","unstructured":"Handschuh, Helena; Trichina, Elena: High Density Smart Cards: New Security Challenges and Applications. In: Pohlmann, N., Reimer, H., Schneider, W. (Eds.): ISSE\/SECURE 2007 Securing Electronic Business Processes, Vieweg, 2007, p. 251\u2013259."},{"key":"22_CR11","unstructured":"Internet2: Shibboleth 2 Documentation. March, 2008. https:\/\/spaces.internet2.edu\/display\/SHIB2\/Home"},{"key":"22_CR12","unstructured":"IBM Zurich Research Laboratory: JCOP Tools 3.0 (Eclipse plugin). Technical brief, revision 1.0, 2003. ftp:\/\/ftp.software.ibm.com\/software\/pervasive\/info\/JCOPTools3Brief.pdf."},{"key":"22_CR13","unstructured":"Java Community Process: Security and Trust Services API (SATSA) for Java\u2122 2 Platform, Micro Edition, v. 1.0. Sun Microsystems, Inc., 2004. http:\/\/www.jcp.org\/en\/jsr\/detail?id=177"},{"key":"22_CR14","unstructured":"Java Community Process: Contactless Communication API, JSR 257, v. 1.0. Nokia Corporation, 2006. http:\/\/www.jcp.org\/en\/jsr\/detail?id=257"},{"key":"22_CR15","unstructured":"Liberty Alliance Project: Liberty Alliance ID-FF 1.2 Specifications. December 2007. http:\/\/www.projectliberty.org\/liberty\/specifications__1"},{"key":"22_CR16","unstructured":"M\u00fcller, G\u00fcnter; Wohlgemuth, Sven: Study on Mobile Identity Management. FIDIS \u2014 Future of Identity in the Information Society, deliverable 3.3. May, 2005."},{"key":"22_CR17","unstructured":"OpenID Foundation: OpenID Authentication 2.0 \u2014 Final. December 5, 2007. http:\/\/openid.net\/specs\/openid-authentication-2_0.html"},{"key":"22_CR18","unstructured":"Srage, Jay; Azema, Jerome: M-Shield Mobile Security Technology: making wireless secure. Texas Instruments white paper, February 2008. http:\/\/focus.ti.com\/pdfs\/wtbu\/ti_mshield_whitepaper.pdf"}],"container-title":["ISSE 2008 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-8348-9283-6_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T12:22:48Z","timestamp":1606134168000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-8348-9283-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783834806604","9783834892836"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-8348-9283-6_22","relation":{},"subject":[]}}