{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T05:50:13Z","timestamp":1725083413545},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1007\/s11623-014-0207-5","type":"journal-article","created":{"date-parts":[[2014,7,31]],"date-time":"2014-07-31T05:36:05Z","timestamp":1406784965000},"page":"462-466","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Abstreitbarkeit bei eID-L\u00f6sungen"],"prefix":"10.1007","volume":"38","author":[{"given":"Marc","family":"Fischlin","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,1]]},"reference":[{"key":"207_CR1","volume-title":"Digital Agenda for Europe: e-Identification","author":"European Commission","year":"2014","unstructured":"European Commission: Digital Agenda for Europe: e-Identification. \n                    http:\/\/ec.europa.eu\/digital-agenda\/en\/e-identification\n                    \n                  , 2014."},{"key":"207_CR2","volume-title":"Vergleich von eID-Privacy-Konzepten aus kryptographischer Sicht. 24. Fraunhofer SIT SmartCard-Workshop","author":"M Fischlin","year":"2014","unstructured":"Marc Fischlin. Vergleich von eID-Privacy-Konzepten aus kryptographischer Sicht. 24. Fraunhofer SIT SmartCard-Workshop, Fraunhofer Verlag Stuttgart, 2014."},{"key":"207_CR3","volume-title":"Privacy-Konzepte f\u00fcr den Personalausweis aus kryptographischer Sicht. 22. Fraunhofer SIT SmartCard-Workshop, Fraunhofer Verlag Stuttgart","author":"M Fischlin","year":"2012","unstructured":"Marc Fischlin. Privacy-Konzepte f\u00fcr den Personalausweis aus kryptographischer Sicht. 22. Fraunhofer SIT SmartCard-Workshop, Fraunhofer Verlag Stuttgart, 2012"},{"key":"207_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_20","volume-title":"A Cryptographic Analysis of OPACITY","author":"\u00d6 Dagdelen","year":"2013","unstructured":"\u00d6zg\u00fcr Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete: A Cryptographic Analysis of OPACITY. ESORICS 2013, LNCS, Springer, 2013."},{"key":"207_CR5","volume-title":"Machine readable travel documents. Technical Report Doc 9303, Part 1, Machine Readable Passports","author":"International Civil Aviation Organization ICAO","year":"2006","unstructured":"International Civil Aviation Organization (ICAO): Machine readable travel documents. Technical Report Doc 9303, Part 1, Machine Readable Passports, Sixth Edition, 2006.","edition":"Sixth Edition"},{"key":"207_CR6","unstructured":"TrueCrypt, \n                    http:\/\/www.truecrypt.org\/\n                    \n                  , 2014."},{"key":"207_CR7","volume-title":"Off-the-Record Messaging","author":"The OTR Development Team.","year":"2014","unstructured":"The OTR Development Team. Off-the-Record Messaging. \n                    https:\/\/otr.cypherpunks.ca\/\n                    \n                  , 2014."},{"issue":"2","key":"207_CR8","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1137\/S0097539795291562","volume":"30","author":"D Dolev","year":"2000","unstructured":"Danny Dolev, Cynthia Dwork, und Moni Naor. Nonmalleable cryptography. SIAM Journal on Computing, 30(2):391\u2013437, 2000.","journal-title":"SIAM Journal on Computing"},{"issue":"6","key":"207_CR9","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1145\/1039488.1039489","volume":"51","author":"C Dwork","year":"2004","unstructured":"Cynthia Dwork, Moni Naor, und Amit Sahai. Concurrent zero-knowledge. J. ACM 51(6): 851\u2013898, 2004.","journal-title":"J. ACM"},{"key":"207_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_10","volume-title":"Composability and On-Line Deniability of Authentication","author":"Y Dodis","year":"2009","unstructured":"Yevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi Walfish: Composability and On-Line Deniability of Authentication. TCC 2009, LNCS, Springer, 2009."},{"issue":"4","key":"207_CR11","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1007\/s00145-009-9044-3","volume":"22","author":"M D Raimondo","year":"2009","unstructured":"Mario Di Raimondo, Rosario Gennaro: New Approaches for Deniable Authentication. J. Cryptology 22(4): 572\u2013615, 2009.","journal-title":"J. Cryptology"},{"key":"207_CR12","volume-title":"ACM Conference on Computer and Communications Security","author":"M D Raimondo","year":"2006","unstructured":"Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk: Deniable authentication and key exchange. ACM Conference on Computer and Communications Security 2006, ACM Press, 2006"},{"key":"207_CR13","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik: Advanced security mechanism for machine readable travel documents, Part 1, Technical Report (BSI-TR-03110-1), Version 2.10, 2012"},{"key":"207_CR14","volume-title":"Information technology \u2014 Security techniques \u2014 Non-repudiation \u2014 Part 1: General","author":"ISO\/IEC 13888-1:2009.","year":"2009","unstructured":"ISO\/IEC 13888-1:2009. Information technology \u2014 Security techniques \u2014 Non-repudiation \u2014 Part 1: General, 2009."},{"key":"207_CR15","volume-title":"Rump Session, Crypto","author":"A Herzberg","year":"1991","unstructured":"Amir Herzberg. Rump Session, Crypto 1991."},{"key":"207_CR16","doi-asserted-by":"publisher","DOI":"10.1145\/195058.195407","volume-title":"Receipt-free secret-ballot elections (extended abstract)","author":"J C Benaloh","year":"1994","unstructured":"Josh Cohen Benaloh, Dwight Tuinstra: Receipt-free secret-ballot elections (extended abstract). STOC 1994, ACM Press, 1994."},{"key":"207_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052229","volume-title":"Deniable Encryption","author":"R Canetti","year":"1997","unstructured":"Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky: Deniable Encryption. CRYPTO 1997, LNCS, Springer, 1997."},{"key":"207_CR18","volume-title":"FOCS 1996","author":"R Canetti","year":"1996","unstructured":"Ran Canetti, Rosario Gennaro: Incoercible Multiparty Computation (extended abstract). FOCS 1996, IEEE, 1996."},{"key":"207_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.8","volume-title":"Coercion-Resistance and Receipt-Freeness in Electronic Voting","author":"Stephanie Delaune","year":"2006","unstructured":"Stephanie Delaune, Steve Kremer, Mark Ryan: Coercion-Resistance and Receipt-Freeness in Electronic Voting. CSFW 2006, LNCS, Springer, 2006."},{"key":"207_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_25","volume-title":"The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security","author":"J Bender","year":"2012","unstructured":"Jens Bender, \u00d6zg\u00fcr Dagdelen, Marc Fischlin, Dennis K\u00fcgler: The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security. Financial Cryptography 2012, LNCS, Springer, 2012."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0207-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-014-0207-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0207-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0207-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:22:43Z","timestamp":1559398963000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-014-0207-5"}},"subtitle":["Ein weiterer Aspekt zum Schutz der Privatsph\u00e4re"],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":20,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2014,7]]}},"alternative-id":["207"],"URL":"https:\/\/doi.org\/10.1007\/s11623-014-0207-5","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7]]}}}