{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T18:21:01Z","timestamp":1648923661507},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1007\/s11623-016-0581-2","type":"journal-article","created":{"date-parts":[[2016,4,22]],"date-time":"2016-04-22T04:41:16Z","timestamp":1461300076000},"page":"217-221","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Schl\u00fcsselverteilung f\u00fcr Mobilger\u00e4te"],"prefix":"10.1007","volume":"40","author":[{"given":"Gunnar","family":"Jacobson","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,4,23]]},"reference":[{"key":"581_CR1","doi-asserted-by":"crossref","unstructured":"Shirey: RFC 4949, Internet Security Glossary, Version 2, IETF 2007.","DOI":"10.17487\/rfc4949"},{"key":"581_CR2","doi-asserted-by":"crossref","unstructured":"B. Ramsdell, Secure\/Multipurpose Internet Mail Extensions (S\/MIME) Version 3.1 Message Specification, Request for Comments: 3851, IETF (2004)","DOI":"10.17487\/rfc3851"},{"key":"581_CR3","volume-title":"Mobiler Datenaustausch in der Cloud mit Zertifikaten","author":"G. Jacobson","year":"2013","unstructured":"G. Jacobson: Mobiler Datenaustausch in der Cloud mit Zertifikaten, DACH Security 2013"},{"key":"581_CR4","unstructured":"Good Technologies: Mobility Index Report Q3 2015"},{"key":"581_CR5","volume-title":"Neue Mobiltelefone: Geldb\u00f6rse und Bankfiliale zugleich","author":"S. Spitz","year":"2012","unstructured":"S. Spitz: Neue Mobiltelefone: Geldb\u00f6rse und Bankfiliale zugleich, DuD 3, 2012"},{"key":"581_CR6","unstructured":"G. Jacobson: The Public Key Muddle, Proceedings of the iSSE 2015"},{"key":"581_CR7","unstructured":"Apple: Keychain Services Programming Guide, developer.apple.com"},{"key":"581_CR8","unstructured":"Google: \u201eAndroid Keystore System\u201c, developer.android.com"},{"key":"581_CR9","doi-asserted-by":"crossref","unstructured":"T. Cooijmans, R. de Ruiter, E. Poll: Analysis of Secure Key Storage Solutions on Android, SPSM \u201814 Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014","DOI":"10.1145\/2666620.2666627"},{"key":"581_CR10","unstructured":"Apple: Mobile Device Management Protocol Reference, developer.apple. com"},{"issue":"2","key":"581_CR11","volume":"6","year":"2012","unstructured":"K. Rhee, W. Jeon, D. Won: Security Requirements of a Mobile Device Management System, International Journal of Security and Its Applications Vol. 6, No. 2, April, 2012","journal-title":"International Journal of Security and Its Applications"},{"key":"581_CR12","doi-asserted-by":"crossref","unstructured":"G. Jacobson, A. Neppach: Zertifikatsverzeichnisse f\u00fcr \u201e\u00f6ffentliche\u201c Public Keys, DuD 7, 2009","DOI":"10.1007\/s11623-009-0102-7"},{"key":"581_CR13","volume-title":"Anbindung von Zertifikatsverzeichnissen","author":"G. Jacobson","year":"2006","unstructured":"G. Jacobson: Anbindung von Zertifikatsverzeichnissen, DACH Security 2006"},{"key":"581_CR14","unstructured":"ETSI: TS 102 042 V2.4.1: Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing public key certificates 2013"},{"key":"581_CR15","unstructured":"AICPA\/CICA WebTrust Program for Certification Authorities: Trust Service Principles and Criteria for Certification Authorities v2.0, 2011"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-016-0581-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-016-0581-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-016-0581-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-016-0581-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T19:23:12Z","timestamp":1567797792000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-016-0581-2"}},"subtitle":["Automatisierte, benutzertransparente Ende-zu-Ende Verschl\u00fcsselung mit digitalen Zertifikaten"],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":15,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,4]]}},"alternative-id":["581"],"URL":"https:\/\/doi.org\/10.1007\/s11623-016-0581-2","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4]]}}}