{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T10:59:54Z","timestamp":1649156394907},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T00:00:00Z","timestamp":1648166400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T00:00:00Z","timestamp":1648166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s11623-022-1589-4","type":"journal-article","created":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T18:17:50Z","timestamp":1648232270000},"page":"209-214","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Die Bedeutung von PKI \u2013 Gestern, Heute und Morgen"],"prefix":"10.1007","volume":"46","author":[{"given":"Arno","family":"Fiedler","sequence":"first","affiliation":[]},{"given":"Ernst-G.","family":"Giessmann","sequence":"additional","affiliation":[]},{"given":"Kim","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,25]]},"reference":[{"issue":"6","key":"1589_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"W. Diffie, M. E. Hellman: New Directions in Cryptography. In: IEEE Transactions on Information Theory. Band 22, Nr.\u00a06, 1976, S. 644\u2013654","journal-title":"IEEE Transactions on Information Theory"},{"key":"1589_CR2","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Peter W. Shor: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. In: SIAM Journal on Computing, 26\/1997, S. 1484\u20131509","journal-title":"SIAM Journal on Computing"},{"key":"1589_CR3","unstructured":"X.509: Information technology \u2013 Open Systems Interconnection \u2013 The Directory: Public-key and attribute certificate frameworks. ITU und ISO, 1988-2019, aktuell ist die 9. Edition von 2019-10-14"},{"key":"1589_CR4","doi-asserted-by":"crossref","unstructured":"S. Santesson, M. Myers, R. Ankney, A. Malpani, S. Galperin, C. Adams: X.509 Internet Public Key Infrastructure \u2013 Online Certificate Status Protocol \u2013 OCSP, RFC 6960, IETF, 2013-06","DOI":"10.17487\/rfc6960"},{"issue":"9","key":"1589_CR5","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1007\/s11623-008-0144-2","volume":"32","author":"F Naujokat","year":"2008","unstructured":"F. Naujokat, A. Fiedler, W. Schwab: Akzeptanz von Vertrauensr\u00e4umen in IT-Infrastrukturen \u2013 Bildung nicht hierarchischer Vertrauensr\u00e4ume mittels des ETSI TSL-Konzeptes im Gesundheitswesen. Datenschutz und Datensicherheit 32(9): 605-609 (2008)","journal-title":"Datenschutz und Datensicherheit"},{"key":"1589_CR6","unstructured":"https:\/\/www.cpacanada.ca\/en\/business-and-accounting-resources\/audit-and-assurance\/overview-of-webtrust-services\/principles-and-criteria"},{"key":"1589_CR7","unstructured":"Richtlinie 1999\/93\/EG des Europ\u00e4ischen Parlaments und des Rates vom 13.\u00a0Dezember 1999 \u00fcber gemeinschaftliche Rahmenbedingungen f\u00fcr elektronische Signaturen"},{"key":"1589_CR8","unstructured":"Verordnung (EU) Nr.\u00a0910\/2014 des Europ\u00e4ischen Parlaments und des Rates vom 23.\u00a0Juli 2014 \u00fcber elektronische Identifizierung und Vertrauensdienste f\u00fcr elektronische Transaktionen im Binnenmarkt und zur Aufhebung der Richtlinie 1999\/93\/EG (https:\/\/eur-lex.europa.eu\/legal-content\/DE\/TXT\/?uri=CELEX:32014R0910)"},{"key":"1589_CR9","unstructured":"ICAO Doc 9303, Part 10"},{"key":"1589_CR10","doi-asserted-by":"crossref","unstructured":"Ross Housley: Cryptographic Message Syntax, RFC 5652, IETF, 2009-09","DOI":"10.17487\/rfc5652"},{"key":"1589_CR11","unstructured":"BSI-TR03153: Technische Sicherheitseinrichtung f\u00fcr elektronische Aufzeichnungssysteme: https:\/\/www.bsi.bund.de\/DE\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/Technische-Richtlinien\/TR-nach-Thema-sortiert\/tr03153\/tr03153_node.html"},{"key":"1589_CR12","unstructured":"BSI-TR-03145: Secure CA operation. https:\/\/www.bsi.bund.de\/DE\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/Technische-Richtlinien\/TR-nach-Thema-sortiert\/tr03145\/TR-03145_node.html"},{"key":"1589_CR13","unstructured":"BSI_TR-02102: Kryptographische Verfahren: Empfehlungen und Schl\u00fcssell\u00e4ngen, https:\/\/www.bsi.bund.de\/DE\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/Technische-Richtlinien\/TR-nach-Thema-sortiert\/tr02102\/tr02102_node.html"},{"key":"1589_CR14","unstructured":"Qualified Website Authentication Certificates: Promoting consumer trust in the website authentication market https:\/\/www.enisa.europa.eu\/publications\/qualified-website-authentication-certificates"},{"key":"1589_CR15","unstructured":"CECPQ1 in TLS https:\/\/chromestatus.com\/feature\/5749214348836864"},{"key":"1589_CR16","unstructured":"BSI: Kryptografie quantensicher gestalten, 15.12.2021 , https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/Broschueren\/Kryptografie-quantensicher-gestalten.html"},{"key":"1589_CR17","unstructured":"Frank Byszio, Dr. Klaus-Dieter Wirth, Dr. Kim Nguyen \u201cIntelligent Composed Algorithms (ICA)\u201d, https:\/\/ia.cr\/2021\/813"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-022-1589-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-022-1589-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-022-1589-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T18:48:04Z","timestamp":1648234084000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-022-1589-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,25]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["1589"],"URL":"https:\/\/doi.org\/10.1007\/s11623-022-1589-4","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,25]]},"assertion":[{"value":"25 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}