{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T12:45:58Z","timestamp":1648903558142},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1007\/s11623-014-0205-7","type":"journal-article","created":{"date-parts":[[2014,7,31]],"date-time":"2014-07-31T05:36:05Z","timestamp":1406784965000},"page":"452-456","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Zukunft der Web-PKI?"],"prefix":"10.1007","volume":"38","author":[{"given":"J\u00fcrgen","family":"Brauckmann","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,1]]},"reference":[{"key":"205_CR1","unstructured":"http:\/\/www.metzdowd.com\/pipermail\/cryptography\/2013-October\/018041.html"},{"key":"205_CR2","unstructured":"http:\/\/johncouzins.wordpress.com\/2011\/06\/27\/the-history-of-ssltls\/"},{"key":"205_CR3","unstructured":"http:\/\/vnhacker.blogspot.de\/2011\/09\/beast.html"},{"key":"205_CR4","unstructured":"https:\/\/web.archive.org\/web\/20120629152558\/hattp:\/\/www.openssl.org\/~bodo\/tls-cbc.txt"},{"key":"205_CR5","unstructured":"https:\/\/www.trustworthyinternet.org\/ssl-pulse\/"},{"key":"205_CR6","unstructured":"\u201cThe Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software\u201d, Martin Georgiev, Subodh Iyengar, Suman Jana, Rishita Anubhai, Dan Boneh, Vitaly Shmatikov: \n                    www.cs.utexas.edu\/~shmat\/shmat_ccs12.pdf"},{"key":"205_CR7","unstructured":"https:\/\/www.imperialviolet.org\/2014\/02\/22\/applebug.html"},{"key":"205_CR8","unstructured":"http:\/\/heartbleed.com"},{"key":"205_CR9","unstructured":"http:\/\/support.microsoft.com\/kb\/293818\/de"},{"key":"205_CR10","unstructured":"https:\/\/groups.google.com\/d\/msg\/mozilla.dev.security.policy\/aqn0Zm-KxQ0\/x1hfTMGwE2AJ"},{"key":"205_CR11","unstructured":"https:\/\/www.comodo.com\/Comodo-Fraud-Incident-2011-03-23.html"},{"key":"205_CR12","unstructured":"Zwischenbericht DigiNotar Certificate Authority Hack und Relevanz f\u00fcr \u00d6sterreich: \n                    http:\/\/www.cert.at\/static\/downloads\/specials\/CERT.at_report_DigiNotar_Breach_public.pdf"},{"key":"205_CR13","unstructured":"https:\/\/www.ssllabs.com"},{"key":"205_CR14","unstructured":"https:\/\/www.bettercrypto.org"},{"key":"205_CR15","unstructured":"www.heise.de\/newsticker\/meldung\/FTC-bestraft-flapsige-App-Sicherheit-2158928.html"},{"key":"205_CR16","unstructured":"http:\/\/social.technet.microsoft.com\/wiki\/contents\/articles\/1760.windows-root-certificate-program-technical-requirements-version-2-0.aspx"},{"key":"205_CR17","unstructured":"https:\/\/www.mozilla.org\/en-US\/about\/governance\/policies\/securitygroup\/certs\/policy\/"},{"key":"205_CR18","unstructured":"https:\/\/cabforum.org\/baseline-requirements\/"},{"key":"205_CR19","unstructured":"https:\/\/github.com\/moxie0\/Convergence\/wiki"},{"key":"205_CR20","unstructured":"http:\/\/tack.io\/"},{"key":"205_CR21","unstructured":"https:\/\/www.eff.org\/sovereign-keys"},{"key":"205_CR22","unstructured":"http:\/\/perspectives-project.org\/"},{"key":"205_CR23","unstructured":"http:\/\/perspectivessecurity.files.wordpress.com\/2011\/07\/perspectives_usenix08.pdf"},{"key":"205_CR24","unstructured":"https:\/\/datatracker.ietf.org\/doc\/draft-ietf-websec-key-pinning\/"},{"key":"205_CR25","unstructured":"http:\/\/www.certificate-transparency.org"},{"key":"205_CR26","unstructured":"http:\/\/blogs.technet.com\/b\/pki\/archive\/2014\/02\/22\/a-novel-method-inie11-for-dealing-with-fraudulent-digital-certificates.aspx"},{"key":"205_CR27","unstructured":"https:\/\/datatracker.ietf.org\/doc\/rfc6698\/"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0205-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-014-0205-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0205-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0205-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:22:43Z","timestamp":1559398963000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-014-0205-7"}},"subtitle":["Wege aus der Vertrauenskrise"],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":27,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2014,7]]}},"alternative-id":["205"],"URL":"https:\/\/doi.org\/10.1007\/s11623-014-0205-7","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7]]}}}