{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T08:49:42Z","timestamp":1660294182907},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2012,4,26]],"date-time":"2012-04-26T00:00:00Z","timestamp":1335398400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1007\/s11623-012-0130-6","type":"journal-article","created":{"date-parts":[[2012,4,25]],"date-time":"2012-04-25T11:47:17Z","timestamp":1335354437000},"page":"333-338","source":"Crossref","is-referenced-by-count":1,"title":["Staatliche (Anti-)Krypto-Strategien"],"prefix":"10.1007","volume":"36","author":[{"given":"Phillip","family":"Brunst","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,4,26]]},"reference":[{"key":"130_CR1","unstructured":"Clemens, UCLA Journal of Law and Technology 2004, 1, 1 ff."},{"key":"130_CR2","unstructured":"Abelson \/ Anderson \/ Bellovin \/ Benaloh \/ Blaze \/ Diffie \/ Gilmore \/ Neumann \/ Rivest \/ Schiller \/ Schneier, The Risks of Key Recovery, Key Escrow, and Trusted Third Party Encryption (revised 1998 version), online abrufbar unter: http:\/\/www.schneier.com\/paper-key-escrow.html ."},{"key":"130_CR3","unstructured":"Anderson, RIPA III: A legislative turkey comes home to roost \u2014 the tragic consequences of anti-crypto law, http:\/\/www.theregister.co.uk\/2009\/11\/25\/jfl_ripa_opinion\/ ."},{"key":"130_CR4","doi-asserted-by":"crossref","unstructured":"Anderson, Crypto in Europe \u2014 Markets, Law and Policy, in: Dawson \/ Golic (Hrsg.), Cryptography: Policy and Algorithms, S. 75\u201389, 1996.","DOI":"10.1007\/BFb0032347"},{"key":"130_CR5","unstructured":"Baum \/ Trafkowski, CR 2002, 69 ff."},{"key":"130_CR6","unstructured":"Bates, Canadian Journal of Law and Technology 2005 (3), 199 ff."},{"key":"130_CR7","unstructured":"Beucher \/ Schmoll, CR 1999, 529 ff."},{"key":"130_CR8","unstructured":"Brunst, Anonymit\u00e4t im Internet. Rechtliche und tats\u00e4chliche Rahmenbedingungen, 2009."},{"key":"130_CR9","unstructured":"Brunst, DuD 2011, 618 ff."},{"key":"130_CR10","unstructured":"Chaos Computer Club, Analyse einer Regierungs-Malware, abrufbar unter: http:\/\/www.ccc.de\/system\/uploads\/76\/original\/staatstrojaner-report23.pdf ."},{"key":"130_CR11","unstructured":"Cloutier \/ Cohen, Casting a wide net: China\u2019s encryption restrictions, abrufbar unter: http:\/\/bit.ly\/wkI394 ."},{"key":"130_CR12","doi-asserted-by":"crossref","unstructured":"Diehl, DuD 2008, 243 ff.","DOI":"10.1007\/s11623-008-0058-z"},{"key":"130_CR13","unstructured":"Ellsmore, Cryptology: Law Enforcement & National Security vs. Privacy, Security & The Future of Commerce, http:\/\/www.stratsec.net\/getattachment\/86381a54-3d5f-44ee-ab4d-27ff1dd72ee3\/stratsec-Ellsmore-Cryptology-Police-vs-Privacy.pdf."},{"key":"130_CR14","doi-asserted-by":"crossref","unstructured":"Fox, c\u2019t 1995 (07), 72 ff.","DOI":"10.2307\/3546230"},{"key":"130_CR15","unstructured":"Gercke \/ Brunst, Praxishandbuch Internetstrafrecht, 2009."},{"key":"130_CR16","doi-asserted-by":"crossref","unstructured":"Greveler \/ Wegener, DuD 2010, 467 ff.","DOI":"10.1007\/s11623-010-0131-2"},{"key":"130_CR17","unstructured":"G\u00fcnther, CR 1997, 245 ff."},{"key":"130_CR18","doi-asserted-by":"crossref","unstructured":"Illies \/ Lochter \/ Stein, DuD 2011, 807 ff.","DOI":"10.1007\/s11623-011-0190-z"},{"key":"130_CR19","unstructured":"Koops, Crypto Law Survey, http:\/\/rechten.uvt.nl\/koops\/cryptolaw\/ ."},{"key":"130_CR20","unstructured":"Koops, The Crypto Controversy, 1999."},{"key":"130_CR21","unstructured":"K\u00fchne, Strafprozessrecht, 2010."},{"key":"130_CR22","unstructured":"Kuner \/ Hladjk, Teil 17: Rechtsprobleme der Kryptografie, in: Hoeren \/ Sieber (Hrsg.), Handbuch Multimedia-Recht, 29. EL 2011."},{"key":"130_CR23","unstructured":"Reporters without Borders, Internet Enemies Report 2012, abrufbar unter: http:\/\/www.reporter-ohne-grenzen.de\/fileadmin\/rte\/pics\/Pressemitteilungen\/Internetbericht-2012_ENG.pdf ."},{"key":"130_CR24","unstructured":"Sandl, CR 1998, 698 ff."},{"key":"130_CR25","unstructured":"Schuppert, CR 2001, 429 ff."},{"key":"130_CR26","unstructured":"Schneier, Applied Cryptography, 2. A., 1996."},{"key":"130_CR27","unstructured":"Schulzki-Haddouti, c\u2019t 1999, 13, 46 ff."},{"key":"130_CR28","unstructured":"Sergienko, Richmond Journal of Law and Technology 1996, 1."},{"key":"130_CR29","unstructured":"Singh, The Code Book, 2000."},{"key":"130_CR30","unstructured":"Ziercke, Freiheitsrechte und Sicherheit \u2014 kein Gegensatz f\u00fcr die moderne Polizei, in: Brenneisen \/ Staack \/ Kischewski (Hrsg.), 60 Jahre Grundgesetz, 2010."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0130-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-012-0130-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0130-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0130-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,27]],"date-time":"2019-06-27T22:45:55Z","timestamp":1561675555000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-012-0130-6"}},"subtitle":["Kryptographie zwischen B\u00fcrgerrecht und Bedrohung der nationalen Sicherheit"],"short-title":[],"issued":{"date-parts":[[2012,4,26]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2012,5]]}},"alternative-id":["130"],"URL":"https:\/\/doi.org\/10.1007\/s11623-012-0130-6","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4,26]]}}}