{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T13:33:46Z","timestamp":1648992826309},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2006,6,1]],"date-time":"2006-06-01T00:00:00Z","timestamp":1149120000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2006,6]]},"DOI":"10.1007\/s11623-006-0105-6","type":"journal-article","created":{"date-parts":[[2006,7,1]],"date-time":"2006-07-01T05:59:08Z","timestamp":1151733548000},"page":"347-352","source":"Crossref","is-referenced-by-count":0,"title":["Sicherheitsl\u00f6sung f\u00fcr die automatisierte Messdatenkommunikation"],"prefix":"10.1007","volume":"30","author":[{"given":"Luigi","family":"Lo Iacono","sequence":"first","affiliation":[]},{"given":"Sibylle","family":"M\u00fcller","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Ruland","sequence":"additional","affiliation":[]},{"given":"Norbert","family":"Zisky","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,6,1]]},"reference":[{"key":"105_CR1","unstructured":"http:\/\/www.selma-project.de"},{"key":"105_CR2","unstructured":"http:\/\/www.vernetinfo.de\/"},{"key":"105_CR3","unstructured":"N. Zisky (Hrsg.), Das SELMA-Projekt: Konzepte, Modelle, Verfahren. PTB-Bericht IT-12, 2005."},{"key":"105_CR4","unstructured":"Richtlinie 2004\/22\/EG des Europ\u00e4ischen Parlaments und des Rates vom 31. M\u00e4rz 2004 \u00fcber Messger\u00e4te, ABlEG Nr. L 135."},{"key":"105_CR5","unstructured":"Gesetz \u00fcber das Me\u00df-und Eichwesen, BGBl. I, 711, 23. M\u00e4rz 1992."},{"key":"105_CR6","unstructured":"Eichordnung, BGBl. I, 1657, 12. August 1988."},{"key":"105_CR7","unstructured":"PTB-A 50.7: Anforderungen an elektronische und softwaregesteuerte Messger\u00e4te und Zusatzeinrichtungen f\u00fcr Elektrizit\u00e4t, Gas, Wasser und W\u00e4rme, PTB, April 2002."},{"key":"105_CR8","unstructured":"C. Ruland, M. Angele, Sicherheitsanalyse. In: N. Zisky (Hrsg.): Das SELMA-Projekt: Konzepte, Modelle, Verfahren. PTB-Bericht IT-12, 2005."},{"key":"105_CR9","unstructured":"C. Ruland et al., Sicherheitskonzept. In: N. Zisky (Hrsg.): Das SELMA-Projekt: Konzepte, Modelle, Verfahren. PTB-Bericht IT-12, 2005."},{"key":"105_CR10","unstructured":"L. Lo Iacono, C. Ruland, N. Zisky, Secure Transfer of Measurement Data in Open Systems, Computer, Standars & Interfaces, Elsevier, to appear."},{"key":"105_CR11","unstructured":"Common Criteria, August 1999. Abrufbar unter: http:\/\/www.bsi.de\/cc\/index.html"},{"key":"105_CR12","unstructured":"Gesetz \u00fcber Rahmenbedingungen f\u00fcr elektronische Signaturen und zur \u00c4nderung weiterer Vorschriften (Signaturgesetz), BGBl. I, 876 ff., 16. Mai 2001."},{"key":"105_CR13","unstructured":"ISO\/IEC 15946-2, Information technology \u2014 Security techniques \u2014 Cryptographic techniques based on elliptic curves \u2014 Part 2: Digital Signatures, 2002."},{"key":"105_CR14","unstructured":"ANSI X9.62, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), American Bankers Association, 1999."},{"key":"105_CR15","unstructured":"NIST FIPS 186-2, Digital Signature Standard, Januar 2000-"},{"key":"105_CR16","unstructured":"SECG Working Group, Standards for Efficient Cryptography \u2014 SEC 2: Recommended Elliptic Curve Domain Parameters, 2000."},{"key":"105_CR17","unstructured":"NIST FIPS 180-2, Secure Hash Standard, Februar 2004."},{"key":"105_CR18","unstructured":"T. Schaub, Datenmodelle. In: N. Zisky (Hrsg.), Das SELMA-Projekt: Konzepte, Modelle, Verfahren. PTB-Bericht IT-12, 2005."},{"key":"105_CR19","unstructured":"WELMEC 7.2, Software Guide (Measuring Instruments Directive 2004\/22\/EC), Mai 2004."},{"key":"105_CR20","unstructured":"http:\/\/www.simedako.de"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0105-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-006-0105-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0105-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:08:18Z","timestamp":1559412498000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-006-0105-6"}},"subtitle":["Best-Practice L\u00f6sung im liberalisierten Energiemarkt"],"short-title":[],"issued":{"date-parts":[[2006,6]]},"references-count":20,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2006,6]]}},"alternative-id":["105"],"URL":"https:\/\/doi.org\/10.1007\/s11623-006-0105-6","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,6]]}}}