{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T07:42:15Z","timestamp":1648885335668},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,2,27]],"date-time":"2011-02-27T00:00:00Z","timestamp":1298764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1007\/s11623-011-0048-4","type":"journal-article","created":{"date-parts":[[2011,2,26]],"date-time":"2011-02-26T16:18:43Z","timestamp":1298737123000},"page":"192-196","source":"Crossref","is-referenced-by-count":0,"title":["Eine datenschutzrechtlich motivierte Untersuchung Tippverhalten basierender Authentifizierungssysteme"],"prefix":"10.1007","volume":"35","author":[{"given":"Florian","family":"Dotzler","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,2,27]]},"reference":[{"key":"48_CR1","volume-title":"Biometrische Verfahren im Spannungsfeld von Authentizit\u00e4t im elektronischen Rechtsverkehr und Pers\u00f6nlichkeitsschutz","author":"A. Albrecht","year":"2003","unstructured":"Albrecht A (2003) Biometrische Verfahren im Spannungsfeld von Authentizit\u00e4t im elektronischen Rechtsverkehr und Pers\u00f6nlichkeitsschutz. Nomos Verlagsgesellschaft, Frankfurt am Main."},{"issue":"3","key":"48_CR2","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s11623-007-0065-5","volume":"31","author":"A. Albrecht","year":"2007","unstructured":"Albrecht A (2007) Biometrie am Arbeitsplatz \u2014 Konkrete Ausgestaltung der Mitbestimmung. Orientierungshilfe des TeleTrusT e. V. f\u00fcr eine Betriebsvereinbarung beim Einsatz biometrischer Systeme. DuD 31(3):171\u2013175.","journal-title":"DuD"},{"key":"48_CR3","volume-title":"Benutzerauthentifizierung anhand des Tippverhaltens bei Verwendung fester Eingabetexte","author":"I. Bakdi","year":"2007","unstructured":"Bakdi I (2007) Benutzerauthentifizierung anhand des Tippverhaltens bei Verwendung fester Eingabetexte. Universit\u00e4tsverlag Regensburg, Regensburg."},{"issue":"2","key":"48_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jisp.2007040101","volume":"1","author":"D. Bartmann","year":"2007","unstructured":"Bartmann D, Bakdi I, Achatz M (2007) On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text. International Journal of Information Security and Privacy 1(2):1\u201312.","journal-title":"International Journal of Information Security and Privacy"},{"key":"48_CR5","volume-title":"Guide to Biometrics","author":"R. Bolle","year":"2003","unstructured":"Bolle R, Connell J, Pankanti S, Ratha N, Senior A (2003) Guide to Biometrics. Springer Verlag, Berlin."},{"issue":"1","key":"48_CR6","first-page":"36","volume":"29","author":"M. Bromba","year":"2007","unstructured":"Bromba M (2007) Die 14 M\u00e4rchen der Biometrie. WIK 29(1):36\u201338.","journal-title":"WIK"},{"key":"48_CR7","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (2005a) Untersuchung der Leistungsf\u00e4higkeit von biometrischen Verifikationssystemen \u2014 BioP II. \u00d6ffentlicher Abschlussbericht. Bonn."},{"key":"48_CR8","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (2005b) Common Criteria Protection Profile Biometric Verification Mechanisms. BSIPP-0016 Approved by the Federal Ministry of the Interior. Version 1.04. Bonn."},{"key":"48_CR9","unstructured":"Chang W (2006) Keystroke Biometric System Using Wavelets. In: Zhang D, Jain A (Hrsg) ICB 2006. Hong Kong, 647\u2013653."},{"key":"48_CR10","first-page":"626","volume-title":"ICB 2006","author":"S. Cho","year":"2006","unstructured":"Cho S, Hwang S (2006) Artificial Rhythms and Cues for Keystroke Dynamics based Authentication. In: Zhang D, Jain AK (Hrsg) ICB 2006. Springer Verlag, Hong Kong, 626\u2013632."},{"key":"48_CR11","unstructured":"Common Criteria Biometric Evaluation Methodology Working Group (2002) Common Criteria. Common Methodology for Information Technology Security Evaluation. Biometric Evaluation Methodology Supplement. BEM. http:\/\/www.cesg.gov.uk\/poliy_technoloies\/biometrics\/media\/bem_10.pdf . Abruf am 2009-02-19."},{"key":"48_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-658-24048-6","volume-title":"Datenschutzrechtliche Aspekte und der praktische Einsatz biometrischer Systeme in Unternehmen. Eine exemplarische Betrachtung von Systemen auf der Grundlage des biometrischen Merkmals Tippverhalten","author":"F. Dotzler","year":"2010","unstructured":"Dotzler F (2010) Datenschutzrechtliche Aspekte und der praktische Einsatz biometrischer Systeme in Unternehmen. Eine exemplarische Betrachtung von Systemen auf der Grundlage des biometrischen Merkmals Tippverhalten. K\u00f6lner Wissenschaftsverlag, K\u00f6ln."},{"issue":"3","key":"48_CR13","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1145\/1085126.1085129","volume":"8","author":"D. Gunetti","year":"2005","unstructured":"Gunetti D, Picardi C (2005) Keystroke Analysis of Free Text. ACM TISSEC 8(3):312\u2013347.","journal-title":"ACM TISSEC"},{"key":"48_CR14","first-page":"531","volume-title":"ICB 2007","author":"S. Hocquet","year":"2007","unstructured":"Hocquet S, Ramel J, Cardot H (2007) User Classification for Keystroke Dynamics Authentication. In: Lee S, Li S (Hrsg) ICB 2007. Springer Verlag, Seoul, 531\u2013539."},{"key":"48_CR15","unstructured":"Hornung G (2006) Biometrische Verfahren. Sicherheits- und Effizienzgewinne versus Datenschutz. Vortrag, Tagung Hamburger ASJ \u201eDatenschutz auf dem Weg vom 20. ins 21. Jahrhundert. Vom Abwehrrecht zum Gew\u00e4hrleistungsauftrag des Staates?\u201c. Hamburg."},{"issue":"6","key":"48_CR16","first-page":"201","volume":"53","author":"G. Hornung","year":"2005","unstructured":"Hornung G, Steidle R (2005) Biometrie am Arbeitsplatz \u2014 sichere Kontrollverfahren versus ausuferndes Kontrollpotential. Arbeit und Recht 53(6):201\u2013207.","journal-title":"Arbeit und Recht"},{"key":"48_CR17","doi-asserted-by":"crossref","unstructured":"International Biometric Group (IBG) (2009) State of Biometric Standards. New York.","DOI":"10.1016\/S0969-4765(09)70114-6"},{"key":"48_CR18","first-page":"584","volume-title":"ICB 2007","author":"R. Janakiraman","year":"2007","unstructured":"Janakiraman R, Sim T (2007) Keystroke Dynamics in a General Setting. In: Lee SW, Li S (Hrsg) ICB 2007. Springer Verlag, Seoul, 584\u2013593."},{"key":"48_CR19","unstructured":"Krause R (2005) Bewertungskriterien f\u00fcr biometrische Identifikationssysteme im Vergleich zu bisherigen Identifikationsverfahren. Hochschulschrift, Freiburg."},{"issue":"3","key":"48_CR20","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s11623-007-0069-1","volume":"31","author":"M. Meints","year":"2007","unstructured":"Meints M (2007) Implementierung gro\u00dfer biometrischer Systeme. Kriterien und deren Anwendung am Beispiel des ePasses. DuD 31(3):189\u2013193.","journal-title":"DuD"},{"key":"48_CR21","unstructured":"Meints M (2008) Biometrie \u2014 Datenschutz- und Datensicherheitsaspekte. Heise Forum Sicherheit und IT-Recht, CeBIT."},{"key":"48_CR22","doi-asserted-by":"publisher","first-page":"1088","DOI":"10.1109\/IIH-MSP.2008.314","volume-title":"2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","author":"M. Meints","year":"2008","unstructured":"Meints M, Biermann H, Bromba M, Busch C, Hornung G, Quiring-Kock G (2008) Biometric Systems and Data Protection Legislation in Germany. In: Pan J, Niu X, Huang H, Jain L (Hrsg) 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, Washington D. C., 1088\u20131093."},{"key":"48_CR23","unstructured":"TeleTrusT Deutschland e. V., Arbeitsgruppe 6 (2006) Biometrische Identifikationsverfahren: Bewertungskriterien zur Vergleichbarkeit biometrischer Verfahren. Kriterienkatalog. Erfurt."},{"key":"48_CR24","unstructured":"TeleTrusT Deutschland e. V., Arbeitsgruppe Biometrie (2008) White Paper zum Datenschutz in der Biome-trie. Berlin."},{"key":"48_CR25","volume-title":"Biometric Technologies and Verification Systems","author":"J. Vacca","year":"2007","unstructured":"Vacca J (2007) Biometric Technologies and Verification Systems. Butterworth Heinemann, Burlington."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0048-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0048-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0048-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0048-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T21:59:47Z","timestamp":1560031187000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0048-4"}},"subtitle":["Darstellung am Beispiel textgebundener L\u00f6sungen zur Benutzererkennung"],"short-title":[],"issued":{"date-parts":[[2011,2,27]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["48"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0048-4","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,2,27]]}}}