{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T19:26:45Z","timestamp":1649100405356},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,5,1]],"date-time":"2016-05-01T00:00:00Z","timestamp":1462060800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1007\/s11623-016-0600-3","type":"journal-article","created":{"date-parts":[[2016,5,20]],"date-time":"2016-05-20T11:40:52Z","timestamp":1463744452000},"page":"300-304","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["\u201eE-Mail made in Germany\u201c"],"prefix":"10.1007","volume":"40","author":[{"given":"Jurlind","family":"Budurushi","sequence":"first","affiliation":[]},{"given":"Annika","family":"Hilt","sequence":"additional","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,21]]},"reference":[{"key":"600_CR1","volume-title":"Court gave NSA broad leeway in surveillance, documents show","author":"B Gellman","year":"2014","unstructured":"Barton Gellman, Ellen Nakashima. Court gave NSA broad leeway in surveillance, documents show, 2014. Zuletzt zugegriffen am 29.03.2016, http:\/\/www.washingtonpost.com\/world\/national-security\/court-gave-nsabroad-leeway-in-surveillance-documents-show\/2014\/06\/30\/32b872ecfae4-11e3-8176-f2c941cf35f1_story.html"},{"key":"600_CR2","volume-title":"The Snowden Files: The Inside Story of the World\u2019s Most Wanted Man","author":"L Harding","year":"2014","unstructured":"Luke Harding. The Snowden Files: The Inside Story of the World\u2019s Most Wanted Man. Vintage, New York City, 2014."},{"key":"600_CR3","volume-title":"Edward Snowden: Geschichte einer Weltaff\u00e4re","author":"L Harding","year":"2014","unstructured":"Luke Harding. Edward Snowden: Geschichte einer Weltaff\u00e4re. C.W. Leske, D\u00fcsseldorf 2014."},{"key":"600_CR4","volume-title":"Perfect forward secrecy. Encyclopedia of Cryptography and Security","author":"H Krawczyk","year":"2005","unstructured":"Huga Krawczyk. Perfect forward secrecy. Encyclopedia of Cryptography and Security, S. 457-458. Springer US, 2005."},{"key":"600_CR5","unstructured":"Rolf Oppliger. SSL and TLS: Theory and practice. Artech House, 2009."},{"key":"600_CR6","unstructured":"SECUSO. PassSec+\u2013ein add-on das ihre passw\u00f6rter, zahlungsdaten und privatsph\u00e4re sch\u00fctzt. Fachbereich Informatik, TU-Darmstadt. Zuletzt zugegriffen am 29.03.2016, https:\/\/www.secuso.informatik.tu-darmstadt.de\/de\/research\/results\/passsec-deutsch\/."},{"key":"600_CR7","first-page":"58","volume-title":"Hsin-Jia. Secure e-mail protocols providing perfect forward secrecy","author":"H-M Sun","year":"2005","unstructured":"Hung-Min Sun, Hsieh Bin-Tsanund Hwang, Hsin-Jia. Secure e-mail protocols providing perfect forward secrecy. Communications Letters, IEEE 9.1, 2005, S. 58\u201360."},{"key":"600_CR8","unstructured":"NIST. Advanced Encryption Standard (AES). FIPS 197. Zuletzt zugegriffen am 29.03.2016, http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-016-0600-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-016-0600-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-016-0600-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-016-0600-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:26:28Z","timestamp":1559399188000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-016-0600-3"}},"subtitle":["Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern"],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":8,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,5]]}},"alternative-id":["600"],"URL":"https:\/\/doi.org\/10.1007\/s11623-016-0600-3","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5]]}}}