{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T21:20:26Z","timestamp":1648675226466},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"11-12","license":[{"start":{"date-parts":[[2007,11,1]],"date-time":"2007-11-01T00:00:00Z","timestamp":1193875200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2007,11,1]],"date-time":"2007-11-01T00:00:00Z","timestamp":1193875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2007,11]]},"DOI":"10.1007\/bf03253315","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T06:33:22Z","timestamp":1625639602000},"page":"1223-1240","source":"Crossref","is-referenced-by-count":1,"title":["De l\u2019utilit\u00e9 d\u2019une carte d\u2019identit\u00e9 \u00e9lectronique pour s\u00e9curiser le monde num\u00e9rique"],"prefix":"10.1007","volume":"62","author":[{"given":"Fabrice","family":"Mattatia","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"BF03253315_CR1","volume-title":"Technology Review","author":"M. Schrage","year":"2005","unstructured":"Schrage M., The Password Is Fayleyure \u2014 Today\u2019s password schemes are unworkable and offer little security for users, Technology Review, mars 2005."},{"key":"BF03253315_CR2","volume-title":"Usability News","author":"S. Riley","year":"2006","unstructured":"Riley S, Password Security: What Users Know and What They Actually Do, Usability News, vol. 8, issue 1, f\u00e9vrier 2006."},{"key":"BF03253315_CR3","volume-title":"Communication Commerce \u00e9lectronique","author":"T. Piette-Coudol","year":"2005","unstructured":"Piette-Coudol T., L\u2019identit\u00e9 des personnes, les certificats et la signature \u00e9lectronique, Communication Commerce \u00e9lectronique n\u00b0 1, Janvier 2005, Etude 2."},{"key":"BF03253315_CR4","volume-title":"Anonymat et commerce \u00e9lectronique","author":"E. A. Caprioli","year":"2000","unstructured":"Caprioli E. A., Anonymat et commerce \u00e9lectronique, www.caprioli-avocats.com, 2000."},{"key":"BF03253315_CR5","volume-title":"D\u00e9lib\u00e9ration 2005-054 du 30 mars 2005","author":"Commission Nationale de l\u2019Informatique et des Libert\u00e9s","year":"2005","unstructured":"Commission Nationale de l\u2019Informatique et des Libert\u00e9s, D\u00e9lib\u00e9ration 2005-054 du 30 mars 2005, jorf 17 mai 2005."},{"key":"BF03253315_CR6","volume-title":"D\u00e9lib\u00e9ration n\u00b02005-183","author":"Commission Nationale de l\u2019Informatique et des Libert\u00e9s","year":"2006","unstructured":"Commission Nationale de l\u2019Informatique et des Libert\u00e9s, D\u00e9lib\u00e9ration n\u00b02005-183, jorf 12 f\u00e9vrier 2006."},{"key":"BF03253315_CR7","volume-title":"Livre Blanc: la s\u00e9curit\u00e9 des transactions commerciales sur Internet","author":"Fia-net","year":"2006","unstructured":"Fia-net, Livre Blanc: la s\u00e9curit\u00e9 des transactions commerciales sur Internet, mai 2006."},{"key":"BF03253315_CR8","volume-title":"Computer Security Institute publications","author":"L. A. Gordon","year":"2005","unstructured":"Gordon L. A., Loeb M.P., Lucyshyn W., Richardson R., 2005 csi\/fbi Computer crime and security survey, Computer Security Institute publications, 2005."},{"key":"BF03253315_CR9","volume-title":"Consumer fraud and Identity theft complaint data","author":"Federal Trade Commission","year":"2007","unstructured":"Federal Trade Commission, Consumer fraud and Identity theft complaint data, janvier 2007."},{"key":"BF03253315_CR10","volume-title":"State of Spyware, Q1 2006","author":"Webroot Software, Inc","year":"2006","unstructured":"Webroot Software, Inc, State of Spyware, Q1 2006, 2006."},{"key":"BF03253315_CR11","volume-title":"Convention S\u00e9curit\u00e9 Management 2005","author":"T. Seyrat","year":"2005","unstructured":"Seyrat T., Phishing: social engineering et subterfuges, Convention S\u00e9curit\u00e9 Management 2005, 15 juin 2005."},{"key":"BF03253315_CR12","volume-title":"Le \u00abphishing\u00bb, une nouvelle arnaque sur internet","author":"Forum des droits sur l\u2019internet","year":"2005","unstructured":"Forum des droits sur l\u2019internet, Le \u00abphishing\u00bb, une nouvelle arnaque sur internet, communiqu\u00e9 de presse, 27 janvier 2005."},{"key":"BF03253315_CR13","unstructured":"Directive 1999\/93\/ce du Parlement europ\u00e9en et du Conseil, du 13 d\u00e9cembre 1999, sur un cadre communautaire pour les signatures \u00e9lectroniques."},{"key":"BF03253315_CR14","volume-title":"Machine Readable Travel Documents","author":"International Civil Aviation Organization icao)","year":"2002","unstructured":"International Civil Aviation Organization icao), Machine Readable Travel Documents (Doc 9303), 2002."},{"key":"BF03253315_CR15","volume-title":"Top of the web, User Satisfaction and Usage Survey of eGovernment services","author":"R. Management","year":"2004","unstructured":"Ramb\u00f8ll Management, Top of the web, User Satisfaction and Usage Survey of eGovernment services, European Commission, D\u00e9cembre 2004."},{"key":"BF03253315_CR16","volume-title":"D\u00e9bat national sur la carte d\u2019identit\u00e9 \u00e9lectronique, synth\u00e8se des d\u00e9bats en ligne","author":"Forum des droits sur l\u2019internet","year":"2005","unstructured":"Forum des droits sur l\u2019internet, D\u00e9bat national sur la carte d\u2019identit\u00e9 \u00e9lectronique, synth\u00e8se des d\u00e9bats en ligne, juin 2005."},{"key":"BF03253315_CR17","volume-title":"Le Monde","author":"J.-M. Manach","year":"2007","unstructured":"Manach J.-M., Cybersurveillance: les Pays-Bas et l\u2019Allemagne en demandent plus, Le Monde, 20 f\u00e9vrier 2007."},{"key":"BF03253315_CR18","unstructured":"Directive 2006\/24\/ce du Parlement europ\u00e9en et du Conseil du 15 mars 2006, sur la conservation de donn\u00e9es g\u00e9n\u00e9r\u00e9es ou trait\u00e9es dans le cadre de la fourniture de services de communications \u00e9lectroniques accessibles au public ou de r\u00e9seaux publics de communications, et modifiant la directive 2002\/58\/ce."},{"key":"BF03253315_CR19","volume-title":"S\u00e9minaire X-Aristote","author":"Y. Le Hegarat","year":"2004","unstructured":"Le Hegarat Y., Approches prospectives des technologies et usages de l\u2019identit\u00e9 num\u00e9rique, S\u00e9minaire X-Aristote, Palaiseau, 9 d\u00e9cembre 2004."},{"key":"BF03253315_CR20","volume-title":"S\u00e9minaire X-Aristote","author":"J.-S. Lair","year":"2004","unstructured":"Lair J.-S., Gestion et f\u00e9d\u00e9ration d\u2019identit\u00e9 num\u00e9rique dans les chantiers de l\u2019adae, S\u00e9minaire X-Aristote, Palaiseau, 9 d\u00e9cembre 2004."},{"key":"BF03253315_CR21","volume-title":"Annals of Telecommunications","author":"E. Malville","year":"2006","unstructured":"Malville E., Crom J.-M., Gourmelen G., A survey on identity federation solutions, Annals of Telecommunications, 61, n\u00b0 3-4, March-April 2006."},{"key":"BF03253315_CR22","volume-title":"Journal officiel de l\u2019Union europ\u00e9enne","author":"c. R\u00e8glement","year":"2004","unstructured":"R\u00e8glement ce No 2252\/2004 du conseil du 13 d\u00e9cembre 2004 \u00e9tablissant des normes pour les \u00e9l\u00e9ments de s\u00e9curit\u00e9 et les \u00e9l\u00e9ments biom\u00e9triques int\u00e9gr\u00e9s dans les passeports et les documents de voyage d\u00e9livr\u00e9s par les \u00c9tats membres, Journal officiel de l\u2019Union europ\u00e9enne, 29 d\u00e9cembre 2004."},{"key":"BF03253315_CR23","unstructured":"uk Presidency of the eu 2005, Ministerial Declaration approved unanimously on 24 November 2005, Manchester, United Kingdom."},{"key":"BF03253315_CR24","volume-title":"Association Fran\u00e7aise de Normalisation, standarmedia, \u00c9tude d\u2019opportunit\u00e9 sur les usages des infrastructures \u00e0 cl\u00e9 publique et de l\u2019identit\u00e9 num\u00e9rique","author":"afnor \u2014","year":"2007","unstructured":"afnor \u2014 Association Fran\u00e7aise de Normalisation, standarmedia, \u00c9tude d\u2019opportunit\u00e9 sur les usages des infrastructures \u00e0 cl\u00e9 publique et de l\u2019identit\u00e9 num\u00e9rique, parution pr\u00e9vue fin novembre 2007."}],"container-title":["Annales Des T\u00e9l\u00e9communications"],"original-title":[],"language":"fr","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03253315.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/BF03253315\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03253315.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T07:38:31Z","timestamp":1625643511000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/BF03253315"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11]]},"references-count":24,"journal-issue":{"issue":"11-12","published-print":{"date-parts":[[2007,11]]}},"alternative-id":["BF03253315"],"URL":"https:\/\/doi.org\/10.1007\/bf03253315","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,11]]}}}