{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T21:29:57Z","timestamp":1649107797356},"reference-count":5,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wirtsch Inform Manag"],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1007\/bf03248285","type":"journal-article","created":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T17:41:55Z","timestamp":1644514915000},"page":"14-19","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Der ausweis f\u00fcr das internet"],"prefix":"10.1007","volume":"2","author":[{"given":"Marian","family":"Margraf","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,23]]},"reference":[{"issue":"5","key":"BF03248285_CR1","first-page":"295","volume":"34","author":"J. Bender","year":"2010","unstructured":"Jens Bender, Dennis K\u00fcgler, Marian Margraf & Ingo Naumann (2010). Sperrmanagement im neuen deutschen Personalausweis. DuD, Datenschutz und Datensicherheit, 34 (5): 295\u2013298.","journal-title":"Wirtschaftsinformatik und Management"},{"key":"BF03248285_CR2","series-title":"Version 2.02. Report, Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI)","volume-title":"Technische Richtlinie TR-03110, Advanced Security Mechanisms for Machine Readable Travel Documents, Extended Access Control (EAC), Password Authenticated Connection Establishment (PACE), and Restricted Identification (RI)","author":"D. K\u00fcgler","year":"2009","unstructured":"Dennis K\u00fcgler (2009). Technische Richtlinie TR-03110, Advanced Security Mechanisms for Machine Readable Travel Documents, Extended Access Control (EAC), Password Authenticated Connection Establishment (PACE), and Restricted Identification (RI), Version 2.02. Report, Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI)."},{"key":"BF03248285_CR3","series-title":"Report, Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI)","volume-title":"Technische Richtlinie TR-02102, Kryptographische Verfahren: Empfehlungen und Schl\u00fcssell\u00e4ngen","author":"M. Margraf","year":"2008","unstructured":"Marian Margraf (2008). Technische Richtlinie TR-02102, Kryptographische Verfahren: Empfehlungen und Schl\u00fcssell\u00e4ngen. Report, Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI)."},{"key":"BF03248285_CR4","first-page":"33","volume":"5735","author":"J. Bender","year":"2009","unstructured":"Jens Bender, Marc Fischlin & Dennis K\u00fcgler (2009). Security Analysis of the PACE Key-Agreement Protocol. Information Security Conference (ISC) 2009, Lecture Notes in Computer Science, Volume 5735, pp. 33\u201348, Springer.","journal-title":"Wirtschaftsinformatik und Management"},{"issue":"3","key":"BF03248285_CR5","first-page":"850","volume":"32","author":"J. Bender","year":"2008","unstructured":"Jens Bender, Dennis K\u00fcgler, Marian Margraf & Ingo Naumann (2008). Sicherheitsmechanismen f\u00fcr kontaktlose Chips im deutschen elektronischen Personalausweis. DuD, Datenschutz und Datensicherheit, 32(3): 850\u2013864.","journal-title":"Wirtschaftsinformatik und Management"}],"container-title":["Wirtschaftsinformatik und Management"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03248285.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/BF03248285\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03248285.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T17:41:55Z","timestamp":1644514915000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/BF03248285"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":5,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2010,10]]}},"alternative-id":["BF03248285"],"URL":"https:\/\/doi.org\/10.1007\/bf03248285","relation":{},"ISSN":["1867-5905","1867-5913"],"issn-type":[{"value":"1867-5905","type":"print"},{"value":"1867-5913","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,10]]},"assertion":[{"value":"23 July 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}