{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:19:33Z","timestamp":1730297973009,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,21]],"date-time":"2023-05-21T00:00:00Z","timestamp":1684627200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,21]],"date-time":"2023-05-21T00:00:00Z","timestamp":1684627200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,21]]},"DOI":"10.1109\/sp46215.2023.10335652","type":"proceedings-article","created":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T18:40:42Z","timestamp":1701715242000},"page":"588-605","source":"Crossref","is-referenced-by-count":1,"title":["Perceptions of Distributed Ledger Technology Key Management - An Interview Study with Finance Professionals"],"prefix":"10.1109","author":[{"given":"Carolyn","family":"Guthoff","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security,Germany"}]},{"given":"Simon","family":"Anell","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security,Germany"}]},{"given":"Johann","family":"Hainzinger","sequence":"additional","affiliation":[{"name":"Plutoneo Consulting GmbH,Germany"}]},{"given":"Adrian","family":"Dabrowski","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security,Germany"}]},{"given":"Katharina","family":"Krombholz","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security,Germany"}]}],"member":"263","reference":[{"volume-title":"DLT pilot regime: Securities trading on the blockchain","year":"2023","key":"ref1"},{"volume-title":"Rundschreiben 09\/2017 (BA) - Mindestanforderungen an das Risiko- management - MaRisk","year":"2023","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5771\/9783802956409-534"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.37307\/b.978-3-503-20093-1.11"},{"issue":"29","key":"ref5","first-page":"1423","volume-title":"Gesetz zur Einfuhrung von elektronischen Wertpapieren (eWpG)","volume":"1","year":"2021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1628\/978-3-16-160744-8"},{"issue":"19","key":"ref7","first-page":"868","article-title":"Verordnung uber Kryptofondsanteile (KryptoFAV)","volume":"1","year":"2022","journal-title":"Bundesgesetzblatt (Deutschland)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445679"},{"volume-title":"M-of-N Standard Transactions","year":"2023","author":"Andresen","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"first-page":"2023","article-title":"Financial Conduct Authority","volume-title":"Financial sector","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-57pt1r5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC54727.2022.9805533"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_29"},{"volume-title":"BaFin. Now also in electronic form: securities","year":"2023","author":"Heise","key":"ref15"},{"article-title":"CROS - Collaboration in Research and Methodology for Official Statistics","volume-title":"Four eyes principle","year":"2023","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3464967.3488588"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354236"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23015"},{"volume-title":"European Commision. Digital finance package","year":"2023","key":"ref20"},{"volume-title":"About BaFin","year":"2023","author":"Financial","key":"ref21"},{"volume-title":"Know-Your-Customer (KYC)","year":"2023","author":"Financial","key":"ref22"},{"key":"ref23","first-page":"1","article-title":"Rethinking Connection Security In- dicators","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), SOUPS\u2019 16","author":"Felt"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395535"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055069"},{"key":"ref26","article-title":"Germany: Electronic Securities Act Enters into Force","volume-title":"Library of Congress","author":"Jenny","year":"2021"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azh019"},{"first-page":"56","volume-title":"Corda: A distributed ledger","author":"Hearn","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X0999152X"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3046055.3046059"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3422337.3447832"},{"volume-title":"Germany Trade & Invest. Financial services","year":"2023","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00060"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_33"},{"key":"ref35","first-page":"1339","article-title":"I Have No Idea What Im Doing\u201d - On the Usability of Deploying HTTPS","volume-title":"26th USENIX Security Symposium, USENIX Security17","author":"Krombholz"},{"key":"ref36","first-page":"341","article-title":"User Mental Models of Cryp-tocurrency Systems - A Grounded Theory Approach","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), SOUPS20","author":"Mai"},{"volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","year":"2009","author":"Nakamoto","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858400"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363220"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_32"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445407"},{"key":"ref42","first-page":"1","article-title":"Why Johnny cant encrypt: a usability evaluation of PGP 5.0","volume-title":"Proceedings of the 8th conference on USENIX Security Symposium, SSYM99","author":"Whitten"},{"key":"ref43","first-page":"1","article-title":"Ethereum: A Secure Decentralised Generalised Transaction Ledger","author":"Wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"volume-title":"Hierarchical deterministic wallets","year":"2023","author":"Wuille","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00011"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2023,5,21]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10335652.pdf?arnumber=10335652","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:14:53Z","timestamp":1721452493000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10335652\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,21]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10335652","relation":{},"subject":[],"published":{"date-parts":[[2023,5,21]]}}}