{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T18:22:47Z","timestamp":1649096567730},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T00:00:00Z","timestamp":1414800000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s11623-014-0296-1","type":"journal-article","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T08:20:33Z","timestamp":1415953233000},"page":"739-741","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hardware-Sicherheitsmodule"],"prefix":"10.1007","volume":"38","author":[{"given":"Andreas","family":"Philipp","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,6]]},"reference":[{"key":"296_CR1","volume-title":"The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer","author":"T W Arnold","year":"2004","unstructured":"Arnold, T. W., & Doorn, L. P. (July 2004). The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer. IBM J. RES. & DEV."},{"key":"296_CR2","volume-title":"Computer Laboratory, University of Cambridge","author":"M B 4 N Adida Ben","year":"2005","unstructured":"Ben Adida, M. B. (4. November 2005). Computer Laboratory, University of Cambridge. Von \n                    http:\/\/www.cl.cam.ac.uk\/~mkb23\/research\/EMV-Secure-Messaging.pdfabgerufen"},{"key":"296_CR3","volume-title":"SecAppDev","author":"F Demaertelaere","year":"2009","unstructured":"Demaertelaere, F. (2009). Hardware Security Modules. SecAppDev."},{"key":"296_CR4","volume-title":"Computer Laboratory University of Cambridge","author":"R A 2 M Mike Bond","year":"2001","unstructured":"Mike Bond, R. A. (2. May 2001). Computer Laboratory University of Cambridge. Von \n                    http:\/\/www.cl.cam.ac.uk\/~rja14\/Papers\/API-Attacks.pdfabgerufen"},{"key":"296_CR5","volume-title":"Analysis of Security APIs","author":"R F 25\u201328 N Mike Bond","year":"2012","unstructured":"Mike Bond, R. F. (25\u201328. Novmeber 2012). Analysis of Security APIs. \n                    http:\/\/www.dagstuhl.de\/de\/programm\/kalender\/semhp\/?semnr=12482.germany\n                    \n                  ."},{"key":"296_CR6","volume-title":"Advancing open standards for information society","author":"OASIS PKCS 11 TC.","year":"2014","unstructured":"OASIS PKCS 11 TC. Advancing open standards for information society (18. March 2014). Von OASIS: \n                    https:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=pkcs11abgerufen"},{"key":"296_CR7","volume-title":"Handbook of finacial cryptography and security","author":"B Rosenberg","year":"2011","unstructured":"Rosenberg, B. (2011). Handbook of finacial cryptography and security."},{"key":"296_CR8","volume-title":"Secgroup Ca\u2019 Foscari DSI > Projects > Security APIs > Tookan","author":"SecGroup Ca\u2019 Foscari, V.","year":"2010","unstructured":"SecGroup Ca\u2019 Foscari, V. (2010). Secgroup Ca\u2019 Foscari DSI > Projects > Security APIs > Tookan. Von \n                    http:\/\/secgroup.dais.unive.it\/projects\/security-apis\/tookan\/abgerufen"},{"key":"296_CR9","volume-title":"Tamper-Proof enclosure for a circuit board","author":"A K 29 N Sinha","year":"2005","unstructured":"Sinha, A. K. (29. November 2005). Tamper-Proof enclosure for a circuit board. Patent No. US 6970360 B2."},{"key":"296_CR10","volume-title":"Proofs-Workshop.org","author":"G Steel","year":"2012","unstructured":"Steel, G., & joint work with R. Bardou, M. B.-K. (23. September 2012). Proofs-Workshop.org. Von \n                    http:\/\/www.proofs-workshop.org\/2012\/slides\/proofs2012_steel_slides.pdfabgerufen"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0296-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-014-0296-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0296-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0296-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:22:44Z","timestamp":1559398964000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-014-0296-1"}},"subtitle":["Vertrauensanker im Hintergrund"],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":10,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["296"],"URL":"https:\/\/doi.org\/10.1007\/s11623-014-0296-1","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11]]}}}