{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T11:25:52Z","timestamp":1648553152526},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2007,11,1]],"date-time":"2007-11-01T00:00:00Z","timestamp":1193875200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2007,11]]},"DOI":"10.1007\/s11623-007-0265-z","type":"journal-article","created":{"date-parts":[[2007,11,20]],"date-time":"2007-11-20T02:40:39Z","timestamp":1195526439000},"page":"816-821","source":"Crossref","is-referenced-by-count":0,"title":["Signieren mit Chipkartensystemen in unsicheren Umgebungen"],"prefix":"10.1007","volume":"31","author":[{"given":"Sebastian","family":"Gajek","sequence":"first","affiliation":[]},{"given":"Lijun","family":"Liao","sequence":"additional","affiliation":[]},{"given":"J\u00f6rg","family":"Schwenk","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"265_CR1","unstructured":"KBSt \u2014 Koordinierungs- und Beratungsstelle der Bundesregierung f\u00fcr Informationstechnik in der Bundesverwaltung. ww.kbst.bund.de (2007, Sep.)"},{"key":"265_CR2","unstructured":"Smart Cards for Payment Systems: An Introductory Paper describing how Thales e-Security can help banks migrate to Smart Card Technology, Thales eSecurity."},{"key":"265_CR3","unstructured":"FinTS \u2014 Stndard f\u00fcr Sicheres Online-Banking. http:\/\/www.hbci-zka.de (2007, Sep.)"},{"key":"265_CR4","unstructured":"Business internet banking of Barclays. http:\/\/www.barclays.co.uk\/business (2007, Sep.)"},{"key":"265_CR5","unstructured":"Citibank online. https:\/\/web.da-us.citibank.com (2007, Sep.)"},{"key":"265_CR6","unstructured":"CV CryptoVision GmbH. http:\/\/www.cryptovision.de (2007, Sep.)"},{"key":"265_CR7","doi-asserted-by":"crossref","unstructured":"R. Housley, Cryptographic Message Syntax, IETF RFC 3852, July 2004.","DOI":"10.17487\/rfc3852"},{"key":"265_CR8","doi-asserted-by":"crossref","unstructured":"J. Callas, L. Donnerhacke, H. Finney, and R. Thayer, OpenPGP Message Format, IETF RFC 2440, Nov. 1998.","DOI":"10.17487\/rfc2440"},{"key":"265_CR9","unstructured":"M. Bartel, J. Boyer, B. Fox, B. LaMacchia, and E. Simon, XML-Signature Syntax and Processing, W3C Recommendation, Feb. 2002."},{"key":"265_CR10","first-page":"191","volume":"26","author":"A. Spalka","year":"2002","unstructured":"A. Spalka, A. B. Cremers, and H. Langweg, \u201eTrojan horse attacks on software for electronic signatures,\u201d Informatica, vol. 26, pp. 191\u2013204, 2002.","journal-title":"Informatica"},{"key":"265_CR11","doi-asserted-by":"crossref","unstructured":"K. Scheibelhofer, \u201eWhat you see is what you sign \u2014 trustworthy display of xml documents for signing and verification.\u201d Communications and Multimedia Security, 2001.","DOI":"10.1007\/978-0-387-35413-2_1"},{"key":"265_CR12","unstructured":"J. Boyer, D. Eastlake, and J. Reagle, Exclusive XML Canonicalization, Version 1.0, W3C Recommendation, July 2002."},{"key":"265_CR13","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/1103022.1103026","volume-title":"SWS\u2019 05","author":"M. McIntosh","year":"2005","unstructured":"M. McIntosh and P. Austel, \u201eXML signature element wrapping attacks and countermeasures,\u201d in SWS\u2019 05. New York, NY, USA: ACM Press, 2005, pp. 20\u201327."},{"key":"265_CR14","unstructured":"Berglund, S. Boag, D. Chamberlin, M. F. Fernandez, M. Kay, J. Robie, and J. Simon, XML Path Language (XPath), Version 2.0, W3C Recommendation, Jan. 2007."},{"key":"265_CR15","unstructured":"S. Bajaj et. al., Web Services Policy Framework (WSPolicy), version 1.2, IBM, BEA Systems, Microsoft, SAP AG, Sonic Software, VeriSign Std., Mar. 2006."},{"key":"265_CR16","doi-asserted-by":"crossref","unstructured":"S. Gajek, L. Liao, and J. Schwenk, \u201eBreaking and Fixing the Inline Approach.\u201d Accepted for ACM CCS Workshop on Secure Web Services, 2007.","DOI":"10.1145\/1314418.1314425"},{"key":"265_CR17","unstructured":"The legion of the bouncy castle java cryptography apis. (2007, Mar.)"},{"key":"265_CR18","unstructured":"The apache xml security java version. (2007, Mar.)"},{"key":"265_CR19","unstructured":"L. Liao, \u201ePrototype implementation of trustworthy signing with smart card based system in untrusted environments,\u201d Mar. 2007. [Online]. Available: http:\/\/www.nds.rub.de\/liao\/works\/scdsign.zip"},{"key":"265_CR20","unstructured":"H. Langweg: Malware Attacks on Electronic Signatures Revisited. In: J. Dittmann (Hrsg.): \u2018Sicherheit 2006\u2019. S. 244\u2013255."},{"key":"265_CR21","unstructured":"H. Langweg, J. Schwenk: Schutz von FinTS\/HBCI-Clients gegen\u00fcber Malware. D-A-CH Sicherheit, 2007."},{"key":"265_CR22","unstructured":"Roger A. Grimes: An SSL Trojan unmasked. Available: http:\/\/www.infoworld.com\/article\/06\/03\/03\/75970_10OPsecadvise_1.html ."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0265-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-007-0265-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0265-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:08:26Z","timestamp":1559412506000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-007-0265-z"}},"subtitle":["Homebanking mit Secure HBCI\/FinTS"],"short-title":[],"issued":{"date-parts":[[2007,11]]},"references-count":22,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2007,11]]}},"alternative-id":["265"],"URL":"https:\/\/doi.org\/10.1007\/s11623-007-0265-z","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,11]]}}}