{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T16:11:53Z","timestamp":1649088713918},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2013,7,10]],"date-time":"2013-07-10T00:00:00Z","timestamp":1373414400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1007\/s11623-013-0208-9","type":"journal-article","created":{"date-parts":[[2013,7,9]],"date-time":"2013-07-09T02:27:45Z","timestamp":1373336865000},"page":"507-511","source":"Crossref","is-referenced-by-count":0,"title":["Authentisierung mit der Open eCard App"],"prefix":"10.1007","volume":"37","author":[{"given":"Moritz","family":"Horsch","sequence":"first","affiliation":[]},{"given":"Detlef","family":"H\u00fchnlein","sequence":"additional","affiliation":[]},{"given":"Anja","family":"Lehmann","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Schm\u00f6lz","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Wich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,10]]},"reference":[{"key":"208_CR1","volume-title":"P@$$1234: the end of strong password-only security","author":"Deloitte","year":"2013","unstructured":"Deloitte, P@$$1234: the end of strong password-only security, \n                    http:\/\/www.deloitte.com\/view\/en_GX\/global\/industries\/technology-media-telecommunications\/tmt-predictions-2013\/tmt-predictions-2013-technology\/9eb6f4efcbccb310VgnVCM1000003256f70aRCRD.htm#.UXv0YXfaioA\n                    \n                  , 2013."},{"key":"208_CR2","unstructured":"Arbeitsgruppe Identit\u00e4tsschutz im Internet (a-i3), Webseite, \n                    https:\/\/www.a-i3.org\n                    \n                  ."},{"key":"208_CR3","volume-title":"Advanced sign-in security for your Google account","author":"Google Inc.","year":"2011","unstructured":"Google Inc., Advanced sign-in security for your Google account, \n                    http:\/\/googleblog.blogspot.de\/2011\/02\/advancedsign-in-security-for-your.html\n                    \n                  , 2011."},{"key":"208_CR4","volume-title":"AWS Multi-Factor Authentication","author":"Amazon Inc.","year":"2013","unstructured":"Amazon Inc., AWS Multi-Factor Authentication, \n                    http:\/\/aws.amazon.com\/de\/mfa\/\n                    \n                  , 2013."},{"key":"208_CR5","volume-title":"Microsoft Account Gets More Secure","author":"Microsoft Inc.","year":"2013","unstructured":"Microsoft Inc., Microsoft Account Gets More Secure, \n                    http:\/\/blogs.technet.com\/b\/microsoft_blog\/archive\/2013\/04\/17\/microsoft-account-gets-more-secure.aspx\n                    \n                  , 2013."},{"key":"208_CR6","volume-title":"Webseite","author":"FIDO Alliance","year":"2013","unstructured":"FIDO Alliance, Webseite, \n                    http:\/\/www.fidoalliance.org\/\n                    \n                  , 2013."},{"key":"208_CR7","volume-title":"SkIDentity \u2014 Vertrauensw\u00fcrdige Identit\u00e4ten f\u00fcr die Cloud","author":"D H\u00fchnlein","year":"2011","unstructured":"D. H\u00fchnlein, G. Hornung, H. Rossnagel, J. Schm\u00f6lz, T. Wich und J. Zibuschka, SkIDentity \u2014 Vertrauensw\u00fcrdige Identit\u00e4ten f\u00fcr die Cloud, \n                    http:\/\/www.ecsec.de\/pub\/2011_DACH_SkIDentity.pdf\n                    \n                  , 2011."},{"key":"208_CR8","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-642-30102-5_9","volume-title":"Daten- und Identit\u00e4tsschutz in Cloud Computing, E-Government und E-Commerce","author":"Detlef H\u00fchnlein","year":"2012","unstructured":"D. H\u00fchnlein, J. Schm\u00f6lz, T. Wich und M. Horsch, \u201eSicherheitsaspekte beim chipkartenbasierten Identit\u00e4tsnachweis,\u201c in Daten- und Identit\u00e4tsschutz in Cloud Computing, E-Government und E-Commerce, Georg Borges, J\u00f6rg Schwenk (Hrsg.), Springer, 20, pp. 153\u2013168."},{"key":"208_CR9","volume-title":"Survey and analysis of existing eID and credential systems","author":"FutureID","year":"2013","unstructured":"FutureID, Survey and analysis of existing eID and credential systems, Deliverable 32.1, 2013."},{"key":"208_CR10","unstructured":"Bundesamt f\u00fcr Sicherheit in derInformationstechnik, Advanced Security Mechanism for Machine Readable Travel Documents \u2014 Extended Access Control (EAC), Password Authenticated Connection Establishment (PACE), and Restricted Identification (RI), BSI-TR-03110, Version 2.10, 2012."},{"key":"208_CR11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5246","volume-title":"The Transport Layer Security (TLS) Protocol Version 1.2","author":"T Dierks","year":"2008","unstructured":"T. Dierks und E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2, 2008."},{"key":"208_CR12","volume-title":"The Estonian ID Card and Digital Signature Concept \u2014 Principles and Solutions","author":"AS Sertifitseerimiskeskus","year":"2003","unstructured":"AS Sertifitseerimiskeskus, The Estonian ID Card and Digital Signature Concept \u2014 Principles and Solutions, \n                    http:\/\/www.id.ee\/public\/The_Estonian_ID_Card_and_Digital_Signature_Concept.pdf\n                    \n                  , 2003."},{"key":"208_CR13","unstructured":"Population Register Centre, FINeID Specification, \n                    http:\/\/www.fineid.fi\/default.aspx?id=590\n                    \n                  ."},{"key":"208_CR14","volume-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washingtion, DC, USA, November 18\u201322, 2002","author":"J Camenisch","year":"2002","unstructured":"J. Camenisch und E. Van Herreweghen, \u201eDesign and Implementation of the Idemix Anonymous Credential System,\u201c in Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washingtion, DC, USA, November 18\u201322, 2002, 2002."},{"key":"208_CR15","unstructured":"IBM, Identity Mixer, \n                    http:\/\/idemix.wordpress.com\/\n                    \n                  ."},{"key":"208_CR16","unstructured":"Microsoft, U-Prove, \n                    http:\/\/www.microsoft.com\/uprove\n                    \n                  ."},{"key":"208_CR17","volume-title":"Proceedings of the 4th ACM workshop on Digital identity management (DIM \u201808)","author":"D Bauer","year":"2008","unstructured":"D. Bauer, D. M. Blough und D. Cash, \u201eMinimal information disclosure with efficiently verifiable credentials,\u201c in Proceedings of the 4th ACM workshop on Digital identity management (DIM \u201808), New York, 2008."},{"key":"208_CR18","series-title":"LNCS","volume-title":"ASIACRYPT","author":"E Verheul","year":"2001","unstructured":"E. Verheul, \u201eSelf-Blindable Credential Certificates from the Weil Pairing,\u201c in ASIACRYPT, Springer, LNCS 2248, 2001."},{"key":"208_CR19","volume-title":"On the design and implementation of the Open eCard App","author":"D H\u00fchnlein","year":"2012","unstructured":"D. H\u00fchnlein, D. Petrautzki, J. Schm\u00f6lz, T. Wich, M. Horsch, T. Wieland, J. Eichholz, A. Wiesmaier, J. Braun, F. Feldmann, S. Potzernheim, J. Schwenk, K. C., A. K\u00fchne und H. Veit, On the design and implementation of the Open eCard App, GI SICHERHEIT 2012 Sicherheit \u2014 Schutz und Zuverl\u00e4ssigkeit, M\u00e4rz 2012."},{"key":"208_CR20","volume-title":"Die Open eCard App f\u00fcr mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identit\u00e4tsnachweis","author":"M Horsch","year":"2013","unstructured":"M. Horsch, D. H\u00fchnlein, C. Breitenstrom, T. Wieland, A. Wiesmaier, B. Biallowons, D. Petrautzki, S. Potzernheim, J. Schm\u00f6lz, A. Wesner und T. Wich, Die Open eCard App f\u00fcr mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identit\u00e4tsnachweis, BSI-Kongress, Secumedia, 2013."},{"key":"208_CR21","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/978-3-642-19050-6_22","volume-title":"Digital privacy","author":"S P\u00f6tzsch","year":"2011","unstructured":"S. P\u00f6tzsch, K. Borcea-Pfitzmann, M. Hansen, K. Liesebach, A. Pfitzmann und S. Steinbrecher, \u201eRequirements for identity management from the perspective of multilateral interactions,\u201c in Digital privacy, Berlin, Heidelberg, Springer, 2011, pp. 609\u2013649."},{"issue":"5","key":"208_CR22","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s11623-010-0088-1","volume":"34","author":"Marit Hansen","year":"2010","unstructured":"M. Hansen und S. Thomsen, \u201eLebenslanger Datenschutz: Anforderungen an vertrauensw\u00fcrdige Infrastrukturen,\u201c Datenschutz und Datensicherheit, pp. 283\u2013288, 5 34 210.","journal-title":"Datenschutz und Datensicherheit - DuD"},{"key":"208_CR23","volume-title":"Privacy Requirements Analysis","author":"FutureID","year":"2013","unstructured":"FutureID, Privacy Requirements Analysis, Deliverable D22.3, 2013."},{"key":"208_CR24","volume-title":"Machine Readable Travel Documents","author":"International Civil Aviation Organization ICAO","year":"2006","unstructured":"International Civil Aviation Organization (ICAO), Machine Readable Travel Documents, ICAO Doc 9303, Part 1\u20133, 2006\u20132008."},{"key":"208_CR25","volume-title":"Identification card systems \u2014 European Citizen Card","author":"European Committee for Standardization CEN","year":"2008","unstructured":"European Committee for Standardization (CEN), Identification card systems \u2014 European Citizen Card, Part 1\u20134, CEN\/TS 15480, 2008."},{"key":"208_CR26","volume-title":"SuisseID specification \u2014 Digital Certificates and Core Infrastructure Services","author":"Staatssekretariat f\u00fcr Wirtschaft SECO","year":"2010","unstructured":"Staatssekretariat f\u00fcr Wirtschaft (SECO), SuisseID specification \u2014 Digital Certificates and Core Infrastructure Services, Version 1.3, \n                    http:\/\/www.suisseid.ch\n                    \n                  , 2010."},{"key":"208_CR27","volume-title":"The Austrian Citizen Card","author":"A-SIT","year":"2008","unstructured":"A-SIT, The Austrian Citizen Card, Version 1.2, \n                    http:\/\/www.buergerkarte.at\/konzept\/securitylayer\/spezifikation\/aktuell\/\n                    \n                  , 2008."},{"issue":"Nr.3","key":"208_CR28","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s11623-012-0063-0","volume":"36","author":"G Hornung","year":"2012","unstructured":"G. Hornung, M. Horsch und D. H\u00fchnlein, \u201eMobile Authentisierung und Signatur mit dem neuen Personalausweis \u2014 Innovative technische und rechtliche L\u00f6sungsans\u00e4tze,\u201c Datenschutz und Datensicherheit (DuD), Bd. 36, Nr. 3, pp. 189\u2013194, 2012.","journal-title":"Datenschutz und Datensicherheit (DuD)"},{"key":"208_CR29","volume-title":"ISC 2009","author":"J Bender","year":"2009","unstructured":"J. Bender, M. Fischlin und D. K\u00fcgler, \u201eSecurity Analysis of the PACE Key-Agreement Protocol,\u201c in ISC 2009, 2009."},{"key":"208_CR30","volume-title":"ISC 2010","author":"Dagdelen","year":"2010","unstructured":"\u00d6. Dagdelen und M. Fischlin, \u201eSecurity Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.,\u201c in ISC 2010, 2010."},{"key":"208_CR31","first-page":"295","volume-title":"Datenschutz und Datensicherheit","author":"J Bender","year":"2010","unstructured":"J. Bender, D. K\u00fcgler, M. Margraf und I. Naumann, \u201eDas Sperrmanagement im neuen deutschen Personalausweis \u2014 Sperrmanagement ohne globale chipindividuelle Merkmale,\u201c Datenschutz und Datensicherheit, pp. 295\u2013298, 5 34 2010."},{"key":"208_CR32","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), eCard-API-Framework, Technical Guideline TR-03112, Part 1\u20137, Version 1.1.2, \n                    https:\/\/www.bsi.bund.de\/ContentBSI\/Publikationen\/TechnischeRichtlinien\/tr03112\/index_htm.html\n                    \n                  ."},{"key":"208_CR33","unstructured":"ISO\/IEC, Identification cards - Integrated circuit card programming interfaces, ISO\/IEC 24727, Part 1\u20135."},{"key":"208_CR34","volume-title":"An extensible platform for eID, signatures and more","author":"T Wich","year":"2013","unstructured":"T. Wich, D. Petrautzki, J. Schm\u00f6lz, M. Horsch und D. H\u00fchnlein, An extensible platform for eID, signatures and more, in Vorbereitung, 2013."},{"key":"208_CR35","unstructured":"Java.net, LiveConnect Support in the New Java\u2122 Plug-In Technology, \n                    http:\/\/jdk6.java.net\/plugin2\/liveconnect\/\n                    \n                  ."},{"key":"208_CR36","unstructured":"RSA Laboratories, PKCS #11 Base Functionality v2.30: Cryptoki, 2009: \n                    http:\/\/www.cryptsoft.com\/pkcs11doc\/STANDARD\/pkcs-11v2-30b-d5.doc\n                    \n                  ."},{"key":"208_CR37","unstructured":"Microsoft, \u201eCryptographic Service Providers,\u201c [Online]. Available: \n                    http:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/aa380245%28v=vs.85%29.aspx\n                    \n                  ."},{"key":"208_CR38","unstructured":"The Legion of the Bouncy Castle, \u201eBouncy Castle Crypto API,\u201c [Online]. Available: \n                    http:\/\/www.bouncycastle.org\/java.html\n                    \n                  ."},{"key":"208_CR39","volume-title":"JSR 56: Java Network Launching Protocol and API, Maintainance Release 6","author":"A Herrick","year":"2011","unstructured":"A. Herrick, JSR 56: Java Network Launching Protocol and API, Maintainance Release 6, 2011."},{"key":"208_CR40","volume-title":"IFIP IDMAN","author":"J Camenisch","year":"2013","unstructured":"J. Camenisch, M. Dubovitskaya, A. Lehmann, G. Neven, C. Paquin und F.-S. Preiss, \u201eConcepts and languages for privacy-preserving attribute-based authentication,\u201c in IFIP IDMAN, \n                    http:\/\/www.neven.org\/papers\/abc_credspec.html\n                    \n                  , 2013."},{"key":"208_CR41","volume-title":"ABC4Trust Architecture for Developers","author":"J Camenisch","year":"2012","unstructured":"J. Camenisch, I. Krontiris, A. Lehmann, G. Neven, C. Paquin und K. Rannenberg, ABC4Trust Architecture for Developers, \n                    https:\/\/abc4trust.eu\/index.php\/pub\/149-h2-1\n                    \n                  , 2012."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0208-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-013-0208-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0208-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0208-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:22:37Z","timestamp":1559398957000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-013-0208-9"}},"subtitle":["Von Ausweiskarten zu datenschutzfreundlichen Credentials"],"short-title":[],"issued":{"date-parts":[[2013,7,10]]},"references-count":41,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2013,8]]}},"alternative-id":["208"],"URL":"https:\/\/doi.org\/10.1007\/s11623-013-0208-9","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,10]]}}}