{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T22:53:57Z","timestamp":1648767237227},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,1,28]],"date-time":"2018-01-28T00:00:00Z","timestamp":1517097600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1007\/s11623-018-0897-1","type":"journal-article","created":{"date-parts":[[2018,1,27]],"date-time":"2018-01-27T10:06:14Z","timestamp":1517047574000},"page":"74-78","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Sicherheit auf festem Fundament"],"prefix":"10.1007","volume":"42","author":[{"given":"Brandon","family":"Broadnax","sequence":"first","affiliation":[]},{"given":"Bernhard","family":"L\u00f6we","sequence":"additional","affiliation":[]},{"given":"Jeremias","family":"Mechler","sequence":"additional","affiliation":[]},{"given":"J\u00f6rn","family":"M\u00fcller-Quade","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Nagel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,28]]},"reference":[{"key":"897_CR1","first-page":"431","volume-title":"Journal of the ACM (JACM)","author":"G Oded","year":"1996","unstructured":"Oded Goldreich and Rafail Ostrovsky. Software protection and simulation on oblivious RAMs. Journal of the ACM (JACM) 43.3 (1996): 431\u2013473."},{"key":"897_CR2","volume-title":"Proceedings of the nineteenth annual ACM symposium on Theory of computing","author":"G Oded","year":"1987","unstructured":"Oded Goldreich, Silvio Micali, and Avi Wigderson. How to play any mental game. Proceedings of the nineteenth annual ACM symposium on Theory of computing. ACM, 1987."},{"key":"897_CR3","volume-title":"Proceedings of the twentieth annual ACM symposium on Theory of computing","author":"B-O Michael","year":"1988","unstructured":"Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. Com-pleteness theorems for non-cryptographic fault-tolerant distributed computation. Proceedings of the twentieth annual ACM symposium on Theory of computing. ACM, 1988."},{"key":"897_CR4","first-page":"111","volume-title":"Bingo voting: Secure and coercion-free voting using a trusted random number generator","author":"B Jens-Matthias","year":"2007","unstructured":"Jens-Matthias Bohli, J\u00f6rn M\u00fcller-Quade, and Stefan R\u00f6hrich. Bingo voting: Secure and coercion-free voting using a trusted random number generator. VOTE-ID 7 (2007): 111\u2013124."},{"key":"897_CR5","volume-title":"International Conference on E-Business and Telecommunications","author":"A Dirk","year":"2016","unstructured":"Dirk Achenbach et al. Towards Realising Oblivious Voting. International Conference on E-Business and Telecommunications. Springer, Cham, 2016."},{"key":"897_CR6","volume-title":"International Conference on the Theory and Application of Cryptology and Information Security","author":"B Nir","year":"2011","unstructured":"Nir Bitansky et al. Program obfuscation with leaky hardware. International Conference on the Theory and Application of Cryptology and Information Security. Springer Berlin Heidelberg, 2011."},{"key":"897_CR7","volume-title":"Theory of Cryptography Conference","author":"D Nico","year":"2013","unstructured":"Nico D\u00f6ttling et al. Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens. Theory of Cryptography Conference. Springer Berlin Heidelberg, 2013"},{"key":"897_CR8","first-page":"24","volume-title":"Datenschutz und Datensicherheit-DuD 41","author":"B Brandon","year":"2017","unstructured":"Brandon Broadnax, Jeremias Mechler, J\u00f6rn M\u00fcller-Quade, Matthias Nagel, and Jochen Rill. Sicherheit relativ definieren. Datenschutz und Datensicherheit-DuD 41, Nr. 1 (2017): 24\u201328."},{"key":"897_CR9","first-page":"136","volume-title":"42nd Annual Symposium on Foundations of Computer Science (FOCS)","author":"Canetti Ran","year":"2001","unstructured":"Ran Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. 42nd Annual Symposium on Foundations of Computer Science (FOCS). Proceedings. 2001: 136\u2013145."},{"key":"897_CR10","first-page":"115","volume-title":"26th Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Katz Jonathan","year":"2007","unstructured":"Jonathan Katz. Universally Composable Multi-party Computation Using Tamper- Proof Hardware. 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings. 2007: 115\u2013128."},{"key":"897_CR11","first-page":"615","volume-title":"IACR Cryptology ePrint Archive","author":"M Jeremias","year":"2016","unstructured":"Jeremias Mechler, J\u00f6rn M\u00fcller-Quade, Tobias Nilges. Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens. IACR Cryptology ePrint Archive 2016: 615."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-018-0897-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0897-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0897-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,8]],"date-time":"2019-03-08T15:24:03Z","timestamp":1552058643000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-018-0897-1"}},"subtitle":["Starke Sicherheit durch vertrauensw\u00fcrdige Hardware"],"short-title":[],"issued":{"date-parts":[[2018,1,28]]},"references-count":11,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["897"],"URL":"https:\/\/doi.org\/10.1007\/s11623-018-0897-1","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,28]]},"assertion":[{"value":"28 January 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}