{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T01:55:57Z","timestamp":1648518957573},"reference-count":6,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2012,11,24]],"date-time":"2012-11-24T00:00:00Z","timestamp":1353715200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1007\/s11623-012-0296-y","type":"journal-article","created":{"date-parts":[[2012,11,23]],"date-time":"2012-11-23T03:29:55Z","timestamp":1353641395000},"page":"886-890","source":"Crossref","is-referenced-by-count":0,"title":["Angriff auf Thuraya Satellitentelefonie"],"prefix":"10.1007","volume":"36","author":[{"given":"Benedikt","family":"Driessen","sequence":"first","affiliation":[]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,11,24]]},"reference":[{"key":"296_CR1","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-69053-0_17","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201997","author":"Jovan Dj. Goli\u0107","year":"1997","unstructured":"J. Golic. \u201cCryptanalysis of alleged A5 stream cipher\u201d. EUROCRYPT, 1997."},{"key":"296_CR2","doi-asserted-by":"crossref","unstructured":"A. Biryukov, A. Shamir, D. Wagner. \u201cReal Time Cryptanalysis of A5\/1 on a PC\u201d. FSE, 2000.","DOI":"10.1007\/3-540-44706-7_1"},{"key":"296_CR3","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1007\/978-3-540-45146-4_35","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Elad Barkan","year":"2003","unstructured":"E. Barkan, E. Biham, N. Keller. \u201cInstant Ciphertext-Only Cryptanalysis of GSM encrypted communication\u201d. CRYPTO, 2003."},{"key":"296_CR4","doi-asserted-by":"crossref","unstructured":"B. Driessen, R. Hund, C. Willems, C. Paar, T. Holz. \u201cDon\u2019t Trust Satellite Phones: A Security Analysis of Two Satphone Standards\u201d. Security and Privacy, 2012.","DOI":"10.1109\/SP.2012.18"},{"key":"296_CR5","unstructured":"B. Driessen. \u201cEavesdropping on Satellite Telecommunication Systems\u201d. ePrint Archive, 2012."},{"key":"296_CR6","unstructured":"S. Petrovic, A. Fuster-Sabater. \u201cCryptanalysis of the A5\/2 Algorithm\u201d. ePrint Archive, 2000."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0296-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-012-0296-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0296-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0296-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,5]],"date-time":"2019-07-05T21:00:40Z","timestamp":1562360440000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-012-0296-y"}},"subtitle":["Satellitentelefonie nach ETSI-Standard ist unsicher"],"short-title":[],"issued":{"date-parts":[[2012,11,24]]},"references-count":6,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["296"],"URL":"https:\/\/doi.org\/10.1007\/s11623-012-0296-y","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,11,24]]}}}