{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:19:15Z","timestamp":1725574755948},"publisher-location":"Wiesbaden","reference-count":19,"publisher":"Vieweg+Teubner","isbn-type":[{"type":"print","value":"9783834814388"},{"type":"electronic","value":"9783834897886"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-8348-9788-6_3","type":"book-chapter","created":{"date-parts":[[2011,1,12]],"date-time":"2011-01-12T16:35:36Z","timestamp":1294850136000},"page":"26-38","source":"Crossref","is-referenced-by-count":0,"title":["New Authentication Concepts for Electronic Identity Tokens"],"prefix":"10.1007","author":[{"given":"Jan","family":"Eichholz","sequence":"first","affiliation":[]},{"given":"Detlef","family":"H\u00fchnlein","sequence":"additional","affiliation":[]},{"given":"Gisela","family":"Meister","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Schm\u00f6lz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"The BioP@ss homepage: \n                  www.biopass.eu"},{"key":"3_CR2","unstructured":"Comit\u00e9 europ\u00e9en de normalisation (CEN): Identification card systems \u2014 European Citizen Card \u2014 Part 1-4, Technical Standard (partly in preparation), 2010"},{"key":"3_CR3","unstructured":"J. Eichholz, D. H\u00fchnlein, J. Schwenk: SAMLizing the European Citizen Card, in A. Br\u00f6mme & al. (Ed.), Proceedings of BIOSIG 2009: Biometrics and Electronic Signatures, GI-Edition Lecture Notes in Informatics (LNI) 155, 2009, pp. 105\u2013117, \n                  http:\/\/www.ecsec.de\/pub\/SAMLizing-ECC.pdf"},{"key":"3_CR4","unstructured":"ISO\/IEC: Identification cards \u2013 Integrated Circuit Cards, Part 1\u201313 & 15, International Standard"},{"key":"3_CR5","unstructured":"ISO\/IEC: Identification Cards \u2014 Integrated Circuit Cards Programming Interfaces \u2014 Part 1\u20136, International Standard (partly in preparation), 2010"},{"key":"3_CR6","unstructured":"Java Card\u2122 Platform, Version 3.0 Connected Edition, \n                  http:\/\/java.sun.com"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"H. Leitold, A. Hollosi, R. Posch: Security Architecture of the Austrian Citizen Card Concept, Proceedings of the 18th Annual Computer Security Applications Conference, IEEE Press, 2002, pp. 391\u2013401","DOI":"10.1109\/CSAC.2002.1176311"},{"key":"3_CR8","unstructured":"S. Cantor, J. Kemp, R. Philpott, E. Maler: Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2.0, OASIS Standard, 15.03.2005, \n                  http:\/\/docs.oasis-open.org\/security\/saml\/v2.0\/saml-core-2.0-os.pdf\n                  \n                , 2005"},{"key":"3_CR9","unstructured":"J. Kemp, S. Cantor, P. Mishra, R. Philpott, E. Maler: Authentication Context for the OASIS Security Assertion Markup Language (SAML) V2.0, OASIS Standard, 15.03.2005. \n                  http:\/\/docs.oasis-open.org\/security\/saml\/v2.0\/saml-authn-context-2.0-os.pdf\n                  \n                , 2005."},{"key":"3_CR10","unstructured":"S. Cantor, F. Hirsch, J. Kemp, R. Philpott, E. Maler: Bindings for the OASIS Security Assertion Markup Language (SAML) V2.0, OASIS Standard, 15.03.2005. \n                  http:\/\/docs.oasisopen.org\/security\/saml\/v2.0\/saml-bindings-2.0-os.pdf\n                  \n                , 2005"},{"key":"3_CR11","unstructured":"N. Klingenstein: SAML V2.0 Holder-of-Key Web Browser SSO Profile, OASIS Committee Draft 02, 05.07.2009. \n                  http:\/\/www.oasis-open.org\/committees\/download.php\/33239\/sstc-samlholder-of-key-browser-sso-cd-02.pdf\n                  \n                , 2009"},{"key":"3_CR12","unstructured":"S. Cantor, J. Kemp, R. Philpott, E. Maler: Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0, OASIS Standard, 15.03.2005. \n                  http:\/\/docs.oasis-open.org\/security\/saml\/v2.0\/saml-profiles-2.0-os.pdf\n                  \n                 , 2005."},{"key":"3_CR13","unstructured":"Secure idenTity acrOss boRders linKed (STORK) project website, \n                  http:\/\/www.eid-stork.eu\n                  \n                , 2010"},{"key":"3_CR14","unstructured":"J. Alcalde-Mora\u00f1o, J. L. Hern\u00e1ndez-Ardieta, A. Johnston, D. Martinez, B. Zwattendorfer: STORK Deliverable D5.8.1b \u2013 Interface Specification, 08.09.2009, \n                  https:\/\/www.eid-stork.eu\/\n                  \n                index.php?option=com_processes&Itemid=&act=streamDocument&did=960"},{"key":"3_CR15","unstructured":"Federal Office for Information Security (Bundesamt f\u00fcr Sicherheit in der Informationstechnik, BSI): Advanced Security Mechanism for Machine Readable Travel Documents \u2013 Extended Access Control (EAC), Password Authenticated Connection Establishment (PACE), and Restricted Identification (RI), Technical Directive (BSI-TR-03110), Version 2.02, \n                  https:\/\/www.bsi.bund.de\/cae\/servlet\/contentblob\/532066\/publicationFile\/44802\/TR-03110_v202_pdf.pdf\n                  \n                 , 2009."},{"key":"3_CR16","unstructured":"Federal Office for Information Security (Bundesamt f\u00fcr Sicherheit in der Informationstechnik, BSI): Technical Directive eCard-API-Framework, Version 1.1 of 15.07.2009, \n                  https:\/\/www.bsi.bund.de\/cln_156\/sid_BFE35DE615DDE059B55587F30981D6BD\/ContentBSI\/Publikationen\/TechnischeRichtlinien\/tr03112\/index_htm.html"},{"key":"3_CR17","unstructured":"A. Nadalin, M. Goodner, M. Gudgin, A. Barbir, H. Granqvist: WS-SecureConversation 1.4, OASIS Standard \n                  http:\/\/docs.oasis-open.org\/ws-sx\/ws-secureconversation\/v1.4\/ws-secureconversation.pdf\n                  \n                , 2009"},{"key":"3_CR18","unstructured":"XML Encryption Syntax and Processing, \n                  http:\/\/www.w3.org\/TR\/xmlenc-core\/"},{"key":"3_CR19","unstructured":"XML Signature Syntax and Processing, \n                  http:\/\/www.w3.org\/TR\/xmldsig-core\/"}],"container-title":["ISSE 2010 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-8348-9788-6_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T07:14:30Z","timestamp":1606115670000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-8348-9788-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783834814388","9783834897886"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-8348-9788-6_3","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}