{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T12:00:51Z","timestamp":1648728051622},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2014,10,1]],"date-time":"2014-10-01T00:00:00Z","timestamp":1412121600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s11623-014-0268-5","type":"journal-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T15:55:13Z","timestamp":1412092513000},"page":"671-674","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Vertrauen und Sicherheit bei Smartphones"],"prefix":"10.1007","volume":"38","author":[{"given":"Stephan","family":"Spitz","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,1]]},"reference":[{"key":"268_CR1","unstructured":"Artikel zur Attacke auf den Fingerprint-Sensor im Samsung Galaxy S5 \n                    http:\/\/www.heise.de\/security\/meldung\/Samsung-Galaxy-S5-Fingerabdrucksensor-auch-schon-gehackt-2170192.html"},{"key":"268_CR2","unstructured":"\u201eGummi Finger\u201c-Attacke auf Fingerprint-Sensoren in 2002 \n                    http:\/\/www.theregister.co.uk\/2002\/05\/16\/gummi-bears-defeat-fingerprint-sensors\/"},{"key":"268_CR3","unstructured":"Samsung KNOX Technologie White Paper \n                    http:\/\/www.samsung.com\/de\/business\/solutions-services\/mobile-solutions\/security\/samsung-knox\/"},{"key":"268_CR4","unstructured":"Symantec VIP for mobile \n                    http:\/\/m.vip.symantec.com\/home.v"},{"key":"268_CR5","unstructured":"DuD Ausgabe 3\/2012 Artikel \u201eNeue Mobiltelefone: Geldb\u00f6rse und Bank-filiale zugleich\u201c, Stephan Spitz"},{"key":"268_CR6","unstructured":"TEE FAQ und Mediaguide vom Global Platform Konsortium \n                    http:\/\/www.globalplatform.org\/mediaguidetee.asp"},{"key":"268_CR7","unstructured":"TEE Technologie von Trustonic \n                    http:\/\/www.trustonic.com\/technology\/trustzone-and-tee"},{"key":"268_CR8","unstructured":"iOS Security White Paper \n                    http:\/\/images.apple.com\/ipad\/business\/docs\/iOS-Security-Feb14.pdf"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0268-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-014-0268-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0268-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0268-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:22:44Z","timestamp":1559398964000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-014-0268-5"}},"subtitle":["Wie sicher ist mein neues Smartphone?"],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":8,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["268"],"URL":"https:\/\/doi.org\/10.1007\/s11623-014-0268-5","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10]]}}}