{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:35:05Z","timestamp":1725528905761},"publisher-location":"Wiesbaden","reference-count":9,"publisher":"Vieweg+Teubner","isbn-type":[{"type":"print","value":"9783834806604"},{"type":"electronic","value":"9783834892836"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-8348-9283-6_44","type":"book-chapter","created":{"date-parts":[[2009,3,6]],"date-time":"2009-03-06T11:17:39Z","timestamp":1236338259000},"page":"418-423","source":"Crossref","is-referenced-by-count":0,"title":["Securing Contactless Chips with PACE"],"prefix":"10.1007","author":[{"given":"Dennis","family":"K\u00fcgler","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"44_CR1","doi-asserted-by":"crossref","unstructured":"Bellovin, S. M. und Merritt M.: \u201cEncrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks\u201d. In Proceedings of the IEEE Symposium on Research in Security and Privacy, 1992.","DOI":"10.1109\/RISP.1992.213269"},{"key":"44_CR2","doi-asserted-by":"crossref","unstructured":"Boyko, V.; MacKenzie, P. und Patel, S.: \u201cProvably Secure Password Authenticated Key Exchange Using Diffie Hellman\u201d. In Eurocrypt 2000 Proceedings.","DOI":"10.1007\/3-540-45539-6_12"},{"key":"44_CR3","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik: \u201cAdvanced Security Mechanisms for Machine Readable Travel Documents \u2014 Extended Access Control, Version 2.0. BSI Technical Guideline TR-03110."},{"key":"44_CR4","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik: \u201cElliptic Curve Cryptography Based on ISO 15946\u201d. BSI Technical Guideline TR-03111."},{"key":"44_CR5","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik: \u201ceCards mit kontaktloser Schnittstelle als sichere Signaturerstellungseinheit\u201d. BSI Technische Richtlinie TR-03117."},{"key":"44_CR6","unstructured":"Diffie, W. und Hellman, M. E.: \u201cNew Directions in Cryptography\u201d. In IEEE Transactions on Information Theory (22:6), 1976, Seiten 644\u2013654."},{"issue":"5","key":"44_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"D. Jablon","year":"1996","unstructured":"Jablon, D.: \u201cStrong Password-Only Authenticated Key Exchange\u201d. In Computer Communication Review, ACM SIGCOMM, vol. 26, no. 5, Pages 5\u201326, 1996.","journal-title":"Computer Communication Review, ACM SIGCOMM"},{"key":"44_CR8","unstructured":"CEN: \u201cApplication Interface for Smart Cards used as Secure Signature Creation Devices\u201d, prEN14890."},{"key":"44_CR9","unstructured":"T. Wu: \u201cThe Secure Remote Password Protocol\u201d. In Proceedings of the 1998 Internet Society Symposium on Network and Distributed Systems Security, 2000, Pages 97\u2013111."}],"container-title":["ISSE 2008 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-8348-9283-6_44.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T07:23:02Z","timestamp":1606116182000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-8348-9283-6_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783834806604","9783834892836"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-8348-9283-6_44","relation":{},"subject":[]}}