{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T05:54:28Z","timestamp":1695275668093},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T00:00:00Z","timestamp":1695168000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T00:00:00Z","timestamp":1695168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s11623-023-1834-5","type":"journal-article","created":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T09:01:46Z","timestamp":1695200506000},"page":"633-637","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["0 Trust, 100 % Trust Anchor"],"prefix":"10.1007","volume":"47","author":[{"given":"David","family":"Fuhr","sequence":"first","affiliation":[]},{"given":"Dror-John","family":"R\u00f6cher","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,20]]},"reference":[{"key":"1834_CR1","unstructured":"Mozilla Security Blog (2020). \u201cHTTPS-Only Mode in Firefox 83\u201d. Mozilla, https:\/\/blog.mozilla.org\/security\/2020\/11\/17\/firefox-83-introduces-https-only-mode\/."},{"key":"#cr-split#-1834_CR2.1","unstructured":"Fahl, S., Acar, Y., Perl, H., & Smith, M. (2014). Why Eve and Mallory love android: An analysis of android SSL"},{"key":"#cr-split#-1834_CR2.2","unstructured":"(in) security. In Proceedings of the 2012 ACM conference on Computer and communications security (pp. 50-61). ACM."},{"key":"1834_CR3","doi-asserted-by":"crossref","unstructured":"Laurie, B., Langley, A., & Kasper, E. (2013). Certificate Transparency. RFC 6962, IETF.","DOI":"10.17487\/rfc6962"},{"key":"1834_CR4","unstructured":"Weis, Eric (2019). SSL-Inspection \u2013 Fluch oder Segen? https:\/\/www.brandmauer.de\/blog\/it-security\/ssl-inspection-fluch-oder-segen"},{"issue":"6","key":"1834_CR5","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., & Hellman, M. (1976). New Directions in Cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"1834_CR6","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1145\/359460.359473","volume":"21","author":"RC Merkle","year":"1978","unstructured":"Merkle, R. C. (1978). Secure Communications Over Insecure Channels. Communications of the ACM, 21(4), 294-299.","journal-title":"Communications of the ACM"},{"issue":"2","key":"1834_CR7","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., & Adleman, L. (1978). A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2), 120-126.","journal-title":"Communications of the ACM"},{"key":"1834_CR8","doi-asserted-by":"crossref","unstructured":"Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., & Polk, W. (2008). Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280, IETF.","DOI":"10.17487\/rfc5280"},{"key":"1834_CR9","unstructured":"National Institute of Standards and Technology. (2020). Special Publication 800-207, Zero Trust Architecture. NIST."},{"key":"1834_CR10","unstructured":"Marlinspike, Moxie & Perrin, Trevor (editor) (2016). The X3DH Key Agreement Protocol. Revision 1, https:\/\/signal.org\/docs\/specifications\/x3dh\/x3dh.pdf."},{"key":"1834_CR11","unstructured":"Perrin, Trevor (editor) & Marlinspike, Moxie (2016). The Double Ratchet Algorithm. Revision 1, https:\/\/signal.org\/docs\/specifications\/doubleratchet\/doubleratchet.pdf."},{"key":"1834_CR12","doi-asserted-by":"crossref","unstructured":"Campbell, B. & Bradley, J. (2020). OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens, RFC 8705, IETF.","DOI":"10.17487\/RFC8705"},{"key":"1834_CR13","doi-asserted-by":"crossref","unstructured":"Barker, E., & Roginsky, A. (2019). Transitions: Recommendation for transitioning the use of cryptographic algorithms and key lengths. NIST Special Publication, 800-131A.","DOI":"10.6028\/NIST.SP.800-131Ar2"},{"key":"1834_CR14","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., Li, F., Kasten, J., Amann, J., Beekman, J., Payer, M., ... & Paxson, V. (2014). The matter of Heartbleed. In Proceedings of the 2014 Conference on Internet Measurement Conference (pp. 475-488).","DOI":"10.1145\/2663716.2663755"},{"key":"1834_CR15","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Advances in Cryptology \u2014 CRYPTO\u201999 (pp. 388-397). Springer.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"1834_CR16","doi-asserted-by":"crossref","unstructured":"Soghoian, C., & Stamm, S. (2011, October). Certified lies: Detecting and defeating government interception attacks against SSL. In Proceedings of the 15th international conference on Financial Cryptography and Data Security (Vol. 7126, pp. 250-259). Springer.","DOI":"10.1007\/978-3-642-27576-0_20"},{"key":"1834_CR17","doi-asserted-by":"crossref","unstructured":"Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., & Polk, W. (2008). Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC 5280, IETF.","DOI":"10.17487\/rfc5280"},{"key":"1834_CR18","doi-asserted-by":"crossref","unstructured":"Santesson, S. & Myers, M. (2013). X.509 Internet Public Key Infrastructure \u2013 Online Certificate Status Protocol \u2013 OCSP, RFC\u00a06960, IETF.","DOI":"10.17487\/rfc6960"},{"key":"1834_CR19","doi-asserted-by":"crossref","unstructured":"Shor, P. W. (1994). Algorithms for quantum computation: discrete logarithms and factoring. In Proceedings 35th Annual Symposium on Foundations of Computer Science (pp. 124-134). IEEE.","DOI":"10.1109\/SFCS.1994.365700"},{"issue":"1","key":"1834_CR20","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","volume":"18","author":"Q Yan","year":"2018","unstructured":"Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2018). Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges. IEEE Communications Surveys & Tutorials, 18(1), 602-622.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"2","key":"1834_CR21","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39-53.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"1834_CR22","unstructured":"Bhargav-Spantzel, A., Squicciarini, A. C., Czeskis, A., Bertino, E., & Ferrari, E. (2008). Privacy preserving multi-factor authentication with biometrics. In Proceedings of the second ACM conference on Data and Application Security and Privacy (pp. 63-74)."},{"key":"1834_CR23","doi-asserted-by":"crossref","unstructured":"De Cristofaro, E., Durussel, A., & Aad, I. (2011). Reclaiming privacy for smartphone applications. In 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) (pp. 84-90). IEEE.","DOI":"10.1109\/PERCOM.2011.5767598"},{"key":"1834_CR24","doi-asserted-by":"crossref","unstructured":"Sun, S. T., & Beznosov, K. (2012). The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems. In Proceedings of the 2012 ACM conference on Computer and communications security (pp. 378-390).","DOI":"10.1145\/2382196.2382238"},{"key":"1834_CR25","unstructured":"National Institute of Standards and Technology. (2020). Special Publication 800-207, Zero Trust Architecture. NIST."},{"key":"1834_CR26","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (2023). Mindeststandard des BSI zur Verwendung von Transport Layer Security nach \u00a7 8 Absatz 1 Satz 1 BSIG \u2013 Version 2.4 vom 25.05.2023."},{"issue":"3","key":"1834_CR27","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCC.2015.51","volume":"2","author":"C Pahl","year":"2015","unstructured":"Pahl, C. (2015). Containerization and the PaaS Cloud. IEEE Cloud Computing, 2(3), 24-31.","journal-title":"IEEE Cloud Computing"},{"key":"1834_CR28","unstructured":"Moskowitz, R. (2018). Guidelines for Cryptographic Agility and Selecting Cryptographic Suites, RFC 7696, IETF."},{"key":"1834_CR29","doi-asserted-by":"crossref","unstructured":"Hammann , S., Sasse, R. & Basin, D. (2020). Privacy-Preserving OpenID Connect, ASIA CCS \u201920, https:\/\/people.inf.ethz.ch\/basin\/pubs\/asiaccs20.pdf.","DOI":"10.1145\/3320269.3384724"},{"issue":"4","key":"1834_CR30","first-page":"1","volume":"35","author":"A Rane","year":"2020","unstructured":"Rane, A., Lin, C., & Tiwari, M. (2020). Ryoan: A distributed sandbox for untrusted computation on secret data. ACM Transactions on Computer Systems (TOCS), 35(4), 1-30.","journal-title":"ACM Transactions on Computer Systems (TOCS)"},{"key":"1834_CR31","doi-asserted-by":"crossref","unstructured":"Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. In Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing (pp. 169-178).","DOI":"10.1145\/1536414.1536440"},{"issue":"2","key":"1834_CR32","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"7671","key":"1834_CR33","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1038\/nature23461","volume":"549","author":"DJ Bernstein","year":"2017","unstructured":"Bernstein, D. J., & Lange, T. (2017). Post-Quantum Cryptography. Nature, 549(7671), 188-194.","journal-title":"Nature"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-023-1834-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-023-1834-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-023-1834-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T09:36:07Z","timestamp":1695202567000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-023-1834-5"}},"subtitle":["Ultimative Herausforderung f\u00fcr die Kryptographie?"],"short-title":[],"issued":{"date-parts":[[2023,9,20]]},"references-count":34,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["1834"],"URL":"https:\/\/doi.org\/10.1007\/s11623-023-1834-5","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,20]]},"assertion":[{"value":"20 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}