{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T04:12:22Z","timestamp":1742703142455,"version":"3.40.2"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T00:00:00Z","timestamp":1330560000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1007\/s11623-012-0063-0","type":"journal-article","created":{"date-parts":[[2012,3,4]],"date-time":"2012-03-04T20:30:30Z","timestamp":1330893030000},"page":"189-194","source":"Crossref","is-referenced-by-count":1,"title":["Mobile Authentisierung und Signatur mit dem neuen Personalausweis"],"prefix":"10.1007","volume":"36","author":[{"given":"Gerrit","family":"Hornung","sequence":"first","affiliation":[]},{"given":"Moritz","family":"Horsch","sequence":"additional","affiliation":[]},{"given":"Detlef","family":"H\u00fchnlein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,3,3]]},"reference":[{"key":"63_CR1","unstructured":"SJB Research: NFC-world homepage, http:\/\/www.nfcworld.com\/nfcphones-list"},{"key":"63_CR2","unstructured":"ISO\/IEC: Identification cards \u2014 Contactless integrated circuit cards -Proximity cards, ISO\/IEC 14443, International Standard, Part 1 \u2014 4, 2008\u20132011."},{"key":"63_CR3","unstructured":"BSI: Architektur Elektronischer Personalausweis, BSI-TR-03127, Version 1.14, 2011"},{"key":"63_CR4","unstructured":"G. Hornung, Die digitale Identit\u00e4t, 2005, 146 ff., 178 ff., 346 ff. et passim."},{"key":"63_CR5","unstructured":"A. Ro\u00dfnagel, G. Hornung, Ein Ausweis f\u00fcr das Internet. Der neue Personalausweis erh\u00e4lt einen \u201eelektronischen Identit\u00e4tsnachweis\u201c, D\u00d6V 2009, SS 301\u2013306."},{"issue":"3","key":"63_CR6","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/s11623-008-0025-8","volume":"32","author":"Alexander Ro\u00dfnagel","year":"2008","unstructured":"A. Ro\u00dfnagel, G. Hornung, C. Schnabel, Die Authentisierungsfunktion des elektronischen Personalausweises aus datenschutzrechtlicher Sicht, DuD 2008, SS 168\u2013172.","journal-title":"Datenschutz und Datensicherheit - DuD"},{"key":"63_CR7","unstructured":"G. Hornung, J. M\u00f6ller, Passgesetz und Personalausweisgesetz. Kommentar, 2011."},{"issue":"7","key":"63_CR8","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/s11623-009-0103-6","volume":"33","author":"Alexander Ro\u00dfnagel","year":"2009","unstructured":"A. Ro\u00dfnagel: Der elektronische Personalausweis als sichere Signaturerstellungseinheit, DuD, 07\/2009, SS. 403\u2013408.","journal-title":"Datenschutz und Datensicherheit - DuD"},{"key":"63_CR9","unstructured":"BSI: eCards mit kontaktloser Schnittstelle als sichere Signaturerstellungseinheit, BSI-TR-03117, Version 1.0, 2011"},{"key":"63_CR10","unstructured":"BSI: Anforderungen an Chipkartenleser mit nPA Unterst\u00fctzung, BSITR-03119, Version 1.2, 2011"},{"key":"63_CR11","unstructured":"BSI: Advanced Security Mechanisms for Machine Readable Travel Documents, BSI-TR-03110, Version 2.05, 2011"},{"key":"63_CR12","unstructured":"BSI: eCard-API-Framework, BSI-TR-03112, Teil 1\u20137, Version 1.1.1, 2011"},{"key":"63_CR13","unstructured":"BSI: Offizielles Portal f\u00fcr die AusweisApp, https:\/\/www.ausweisapp.bund.de"},{"key":"63_CR14","unstructured":"D. H\u00fchnlein, M. Horsch & al.: On the design and implementation of the Open eCard App, Sicherheit 2012."},{"key":"63_CR15","unstructured":"BSI: eID-Server, BSI-TR-03130, Version 1.5, 2011"},{"key":"63_CR16","first-page":"54","volume-title":"Lecture Notes in Computer Science","author":"\u00d6zg\u00fcr Dagdelen","year":"2011","unstructured":"O. Dagdelen, M. Fischlin: Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents, ISC 2010, SS. 54\u201368"},{"key":"63_CR17","first-page":"33","volume-title":"Lecture Notes in Computer Science","author":"Jens Bender","year":"2009","unstructured":"J. Bender, M. Fischlin, D. Kuegler: Security Analysis of the PACE Key-Agreement Protocol, 2009"},{"key":"63_CR18","unstructured":"ISO\/IEC: Identification cards Integrated circuit cards Part 8: Commands for security operations, 2004"},{"key":"63_CR19","unstructured":"J. Braun, M. Horsch, A. Wiesmaier, D. H\u00fchnlein: Mobile Authentisierung und Signatur, D-A-CH Security 2011, September 2011"},{"key":"63_CR20","unstructured":"BSI: Certificate Policy f\u00fcr die eSign-Anwendung des ePA, Version 1.0.1, 2010"},{"key":"63_CR21","unstructured":"CEN: prEN 14169-1 Protection Profile for Secure signature creation device Part 2: Device with key generation, BSI-CC-PP-0059"},{"key":"63_CR22","unstructured":"BSI: Common Criteria Protection Profile for Inspection Systems, BSI-CCPP-0064"},{"key":"63_CR23","unstructured":"ISO\/IEC: Information technology Telecommunications and information exchange between systems Near Field Communication Interface and Protocol (NFCIP-1), ISO\/IEC 18092, International Standard, 2004."},{"key":"63_CR24","unstructured":"ISO\/IEC: Information technology Telecommunications and information exchange between systems Near Field Communication Interface and Protocol-2 (NFCIP-2), ISO\/IEC 21481, International Standard, 2005"},{"key":"63_CR25","unstructured":"bos GmbH & Co. KG: Governikus Autent, 2011"},{"key":"63_CR26","unstructured":"Ageto Innovation GmbH: AGETO AusweisApp, 2011"},{"key":"63_CR27","unstructured":"Google Inc.: Android, http:\/\/www.android.com"},{"key":"63_CR28","unstructured":"Apple Inc.: iOS 5, http:\/\/www.apple.com\/de\/ios\/"},{"key":"63_CR29","unstructured":"BNetzA: Hinweis zur Signatur-Funktion des neuen Personalausweise, http:\/\/www.bundesnetzagentur.de\/DE\/Sachgebiete\/QES\/Hinweise\/Signaturfunktion_nPA.html"},{"key":"63_CR30","doi-asserted-by":"crossref","unstructured":"A. Wiesmaier, M. Horsch, J. Braun, F. Kiefer, D. H\u00fchnlein, F. Strenzke, J. Buchmann: An efficient mobile PACE implementation, In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS\u2019 11, SS. 176\u2013185","DOI":"10.1145\/1966913.1966936"},{"key":"63_CR31","unstructured":"M. Horsch: Mobile Authentisierung mit dem neuen Personalausweis (MONA), Master Thesis, TU Darmstadt, Juli 2011"},{"key":"63_CR32","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir: How to share a secret, Communications of the ACM 22, 612\u2013613, 1979","journal-title":"Communications of the ACM"},{"key":"63_CR33","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-540-25980-0_26","volume-title":"Public Key Infrastructure","author":"Detlef H\u00fchnlein","year":"2004","unstructured":"D. H\u00fchnlein: How to Qualify Electronic Signatures and Time Stamps, EuroPKI 2004, SS. 314\u2013321"},{"key":"63_CR34","unstructured":"BNetzA: Beschl\u00fcsse der 37. Sitzung der Arbeitsgemeinschaft anerkannter Best\u00e4tigungsstellen (AGAB) vom 04.03.2009 \u2014 PIN-\/PUK-Techniken bei sicheren Signaturerstellungseinheiten nach \u00a7 2 Nr. 10 SigG, 2009"},{"key":"63_CR35","unstructured":"L. Fritsch, H. Ro\u00dfnagel: Die Krise des Signaturmarktes: L\u00f6sungsans\u00e4tze aus betriebswirtschaftlicher Sicht, Sicherheit 2005, SS. 315\u2013326"},{"key":"63_CR36","unstructured":"H. Ro\u00dfnagel, D. Royer: Wirtschaftlichkeit mobiler qualifizierter Signaturen im E-Government, GI Jahrestagung 2006, SS. 451\u2013458"},{"key":"63_CR37","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/11824633_8","volume-title":"Trust and Privacy in Digital Business","author":"Heiko Ro\u00dfnagel","year":"2006","unstructured":"H. Ro\u00dfnagel: On Diffusion and Confusion \u2014 Why Electronic Signatures Have Failed, TrustBus 2006, SS. 71\u201380"},{"key":"63_CR38","unstructured":"D. H\u00fchnlein, G. Hornung, H. Ro\u00dfnagel, J. Schm\u00f6lz, T. Wich, J. Zibuschka: SkIDentity \u2014 Vertrauensw\u00fcrdige Identit\u00e4ten f\u00fcr die Cloud, D-A-CH Security 2011, SS. 296\u2013304"},{"key":"63_CR39","unstructured":"K.-H. Schramm: Kommentierung zu \u00a7 167, in: M\u00fcnchener Kommentar zum BGB, 6. Auflage 2012."},{"key":"63_CR40","unstructured":"P. R\u00f6sler: Formbed\u00fcrftigkeit der Vollmacht \u2014 Eine Darstellung nach Fallgruppen, NJW 1999, SS. 1150\u20131153."},{"key":"63_CR41","volume-title":"Staudinger","author":"E. Schilken","year":"2009","unstructured":"E. Schilken, Kommentierung zu \u00a7 167, in: Staudinger, BGB, Neubearbeitung 2009."},{"key":"63_CR42","doi-asserted-by":"crossref","unstructured":"G. Borges, Rechtsfragen der Haftung im Zusammenhang mit dem elektronischen Identit\u00e4tsnachweis, 2011, 226 ff.","DOI":"10.5771\/9783845229546"},{"issue":"11","key":"63_CR43","doi-asserted-by":"publisher","first-page":"768","DOI":"10.1007\/s11623-011-0183-y","volume":"35","author":"Thomas Zefferer","year":"2011","unstructured":"T. Zefferer, P. Teufl, H. Leitold: Mobile qualifizierte Signaturen in Europa, DuD 11\/2011, SS. 768\u2013774","journal-title":"Datenschutz und Datensicherheit - DuD"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0063-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-012-0063-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0063-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0063-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T10:16:28Z","timestamp":1742638588000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-012-0063-0"}},"subtitle":["Innovative technische und rechtliche L\u00f6sungsans\u00e4tze"],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["63"],"URL":"https:\/\/doi.org\/10.1007\/s11623-012-0063-0","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"type":"print","value":"1614-0702"},{"type":"electronic","value":"1862-2607"}],"subject":[],"published":{"date-parts":[[2012,3]]}}}