{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T11:55:07Z","timestamp":1648554907336},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2013,7,10]],"date-time":"2013-07-10T00:00:00Z","timestamp":1373414400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1007\/s11623-013-0213-z","type":"journal-article","created":{"date-parts":[[2013,7,9]],"date-time":"2013-07-09T06:27:45Z","timestamp":1373351265000},"page":"530-534","source":"Crossref","is-referenced-by-count":0,"title":["eID mit abgeleiteten Identit\u00e4ten"],"prefix":"10.1007","volume":"37","author":[{"given":"Martin","family":"Schr\u00f6der","sequence":"first","affiliation":[]},{"given":"Frank","family":"Morgner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,10]]},"reference":[{"key":"213_CR1","unstructured":"Report M\u00fcnchen, 7. August 2012"},{"key":"213_CR2","unstructured":"\u201eLazy password reuse opens Brits to crooks\u2019 penetration\u201c http:\/\/www.theregister.co.uk\/2012\/07\/20\/password_reuse_survey"},{"key":"213_CR3","unstructured":"Mikko Hypp\u00f6nen, 14. August 2011, https:\/\/twitter.com\/mikko\/statuses\/102984155809333248"},{"key":"213_CR4","doi-asserted-by":"crossref","unstructured":"Bonneau, Herley, van Oorschot, Stajano 2012: \u201cThe Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes\u201d. In Proc. IEEE Symp. on Security and Privacy 2012.","DOI":"10.1109\/SP.2012.44"},{"key":"213_CR5","unstructured":"\u201eHow Apple and Amazon Security Flaws Led to My Epic Hacking\u201d, Matt Honan, 08. Juni 2012, http:\/\/www.wired.com\/gadgetlab\/2012\/08\/apple-amazon-mat-honan-hacking\/"},{"key":"213_CR6","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-0197-0.ch003","volume-title":"Identity Assurance in Open Networks","author":"I Thomas","year":"2012","unstructured":"Ivonne Thomas, Christoph Meinel, 2012 \u201eIdentity Assurance in Open Networks\u201d http:\/\/www.igi-global.com\/chapter\/identity-assurance-open-networks\/63082"},{"key":"213_CR7","volume-title":"TR-03130 Technical Guideline eID-Server, Part I: Functional Specification, Version 2.0","author":"BSI","year":"2012","unstructured":"BSI, 03. Oktober 2012, \u201cTR-03130 Technical Guideline eID-Server, Part I: Functional Specification, Version 2.0\u201d, https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/TechnischeRichtlinien\/TR03130\/TR-03130_TR-eID-Server_V2_1_pdf.pdf"},{"key":"213_CR8","unstructured":"http:\/\/www.microsoft.com\/u-prove"},{"key":"213_CR9","volume-title":"Mobile Nutzung des neuen Personalausweises","author":"Frank Dietrich","year":"2012","unstructured":"Frank Dietrich, 2012 \u201eMobile Nutzung des neuen Personalausweises\u201c in 22. SmartCard-Workshop: Darmstadt 8. Und 9. Februar 2012. Tagungsband"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0213-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-013-0213-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0213-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0213-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T18:02:24Z","timestamp":1563386544000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-013-0213-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,10]]},"references-count":9,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2013,8]]}},"alternative-id":["213"],"URL":"https:\/\/doi.org\/10.1007\/s11623-013-0213-z","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,10]]}}}