{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T03:09:46Z","timestamp":1649128186381},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2006,12,1]],"date-time":"2006-12-01T00:00:00Z","timestamp":1164931200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2006,12]]},"DOI":"10.1007\/s11623-006-0238-7","type":"journal-article","created":{"date-parts":[[2007,1,23]],"date-time":"2007-01-23T08:53:04Z","timestamp":1169542384000},"page":"773-777","source":"Crossref","is-referenced-by-count":1,"title":["Single Sign On mit Signaturen"],"prefix":"10.1007","volume":"30","author":[{"given":"Heiko","family":"Ro\u00dfnagel","sequence":"first","affiliation":[]},{"given":"Jan","family":"Zibuschka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,12,1]]},"reference":[{"key":"238_CR1","unstructured":"Abadi, M., Bharat, K., Marais, J. (1997) System and method for generating unique passwords, United States Patent #6141760."},{"key":"238_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-1-4471-3601-9_1","volume-title":"Proceedings of HCI on People and Computers XII","author":"A. Adams","year":"1997","unstructured":"Adams, A., Sasse, M. A., Lunt, P. (1997) Making Passwords Secure and Usable, Proceedings of HCI on People and Computers XII, August, Bristol, UK, Springer, 1\u201319."},{"key":"238_CR3","unstructured":"Aladdin Knowledge Systems (2006) eToken Simple Sign On, http:\/\/www.aladdin.de\/produkte\/usbtoken_esecurity\/etoken_si_sso.html"},{"key":"238_CR4","volume-title":"Computer Password Choice and Personality Traits Among College Students","author":"B. J. Brown","year":"2004","unstructured":"Brown, B. J., Callis, K. (2004) Computer Password Choice and Personality Traits Among College Students, Southeast Missouri State University, USA."},{"key":"238_CR5","unstructured":"Duserick, W., et al. (2004) Whitepaper on Liberty Protocol and Identity Theft."},{"key":"238_CR6","unstructured":"Ernst & Young (2004) Global Information Security Survey 2004."},{"key":"238_CR7","first-page":"417","volume-title":"Proceedings of the 14th international conference on World Wide Web","author":"J. A. Halderman","year":"2005","unstructured":"Halderman, J. A., Waters, B., Felten, E. W. (2005) A convenient method for securely managing passwords, Proceedings of the 14th international conference on World Wide Web, Chiba, Japan, 417\u2013479."},{"issue":"5","key":"238_CR8","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1108\/10662240510629475","volume":"15","author":"J. Lopez","year":"2005","unstructured":"Lopez, J., Opplinger, R., Pernul, G. (2005) Why Have Public Key Infrastructures Failed So Far? Internet Research, 15,5, 544\u2013556.","journal-title":"Internet Research"},{"key":"238_CR9","unstructured":"Microsoft (2006) Microft Passport Services, http:\/\/www.passport.net"},{"key":"238_CR10","unstructured":"OASIS Consortium (2006) Security Assertion Markup Language (SAML) V2.0, http:\/\/www.oasis-open.org\/specs\/index.php#samlv2.0"},{"key":"238_CR11","unstructured":"RSA Security (2004) RSA SecurID Authentication, http:\/\/www.rsasecurity.com\/node.asp?id=1156"},{"key":"238_CR12","unstructured":"RSA Security (2005) RSA Security Survey Reveals Multiple Passwords Creating Security Risks and End User Frustration, http:\/\/www.rsasecurity.com\/press_release.asp?doc_id=6095"},{"key":"238_CR13","volume-title":"Digitaler Personalausweis \u2014 Eine Machbarkeitsstudie","year":"2005","unstructured":"Reichl, H., Ro\u00dfnagel, A., M\u00fcller, G. (Eds.) (2005) Digitaler Personalausweis \u2014 Eine Machbarkeitsstudie, Deutscher Universit\u00e4ts-Verlag, Wiesbaden."},{"key":"238_CR14","first-page":"381","volume-title":"Proceedings of the Twenty-Sixth International Conference on Information Systems (ICIS 2005)","author":"H. Rhee","year":"2005","unstructured":"Rhee, H., Ryu, Y. U., Kim, C. (2005) I Am Fine But You Are Not \u2014 Optimistic Bias and Illusion of Control on Information Security, Proceedings of the Twenty-Sixth International Conference on Information Systems (ICIS 2005), Las Vegas, Nevada, USA, 381\u2013394."},{"issue":"2","key":"238_CR15","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"Rivest, R. L., Shamir, A., Adleman, L. (1978) A Method for Obtaining Digital Signatures and Public Key Crypto-systems, Communications of the ACM, 21,2, 120\u2013126.","journal-title":"Communications of the ACM"},{"key":"238_CR16","volume-title":"Proceedings of the 14th Usenix Security Symposium","author":"B. Ross","year":"2005","unstructured":"Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J. C. (2005) Stronger Password Authentication Using Browser Extensions, Proceedings of the 14th Usenix Security Symposium, Baltimore, Maryland, USA."},{"key":"238_CR17","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/978-3-540-25980-0_22","volume-title":"Public Key Infrastructures","author":"H. Ro\u00dfnagel","year":"2004","unstructured":"Ro\u00dfnagel, H. (2004) Mobile Signatures and Certification on Demand, in S. K. Katsikas, S. Gritzalis and J. Lopez (Eds.), Public Key Infrastructures, Berlin Heidelberg, Springer, 274\u2013286."},{"key":"238_CR18","unstructured":"Schneier, B. (1999) Password Safe, http:\/\/www.schneier.com\/passafe.html"},{"key":"238_CR19","volume-title":"Authentication: From Passwords to Public Keys","author":"R. E. Smith","year":"2002","unstructured":"Smith, R. E. (2002) The Strong Password Dilemma, Authentication: From Passwords to Public Keys, Boston, Addison Wesley."},{"key":"238_CR20","volume-title":"CSC-STD-002-85 \u2014 Password Management Guideline, Computer Security Center","author":"US Department of Defense","year":"1985","unstructured":"US Department of Defense (1985) CSC-STD-002-85 \u2014 Password Management Guideline, Computer Security Center, Fort George G. Meade, Maryland, USA,."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0238-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-006-0238-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0238-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:08:20Z","timestamp":1559398100000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-006-0238-7"}},"subtitle":["Integration von elektronischen Signaturen und Passwortsystemen"],"short-title":[],"issued":{"date-parts":[[2006,12]]},"references-count":20,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2006,12]]}},"alternative-id":["238"],"URL":"https:\/\/doi.org\/10.1007\/s11623-006-0238-7","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,12]]}}}