{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:32Z","timestamp":1750306832478,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,3,3]],"date-time":"2014-03-03T00:00:00Z","timestamp":1393804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,3,3]]},"DOI":"10.1145\/2557547.2557593","type":"proceedings-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T13:21:11Z","timestamp":1393334471000},"page":"281-288","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["TrustID"],"prefix":"10.1145","author":[{"given":"Julian","family":"Horsch","sequence":"first","affiliation":[{"name":"Fraunhofer AISEC, Garching near Munich, Germany"}]},{"given":"Konstantin","family":"B\u00f6ttinger","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Garching near Munich, Germany"}]},{"given":"Michael","family":"Wei\u00df","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Garching near Munich, Germany"}]},{"given":"Sascha","family":"Wessel","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Garching near Munich, Germany"}]},{"given":"Frederic","family":"Stumpf","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Garching near Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2014,3,3]]},"reference":[{"volume-title":"Smudge Attacks on Smartphone Touch Screens. In WOOT'10: Proceedings of the 4th USENIX conference on Offensive technologies. USENIX Association","year":"2010","author":"Aviv A. J.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"BeID - Berlin electronic IDentity laboratory. eIDClientCore July 2013. Retrieved July 19 2013 from http:\/\/sar.informatik.hu-berlin.de\/BeID-lab\/eIDClientCore\/.  BeID - Berlin electronic IDentity laboratory. eIDClientCore July 2013. Retrieved July 19 2013 from http:\/\/sar.informatik.hu-berlin.de\/BeID-lab\/eIDClientCore\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/882488.884178"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_12"},{"key":"e_1_3_2_1_5_1","first-page":"120","volume-title":"Next Generation Information Technology (ICNIT), 2011 The 2nd International Conference on","author":"Chen W.-D.","year":"2011"},{"volume-title":"Privilege Escalation Attacks on Android. In ISC'10: Proceedings of the 13th international conference on Information security. Springer Berlin Heidelberg","year":"2010","author":"Davi L.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_13"},{"volume-title":"Chokepoints and Countermeasures. ITTC Report on Online Identity Theft Technology and Countermeasures","year":"2005","author":"Emigh A.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Federal Office for Information Security (BSI). BSI TR-03110 Advanced Security Mechanisms for Machine Readable Travel Documents Mar. 2012.  Federal Office for Information Security (BSI). BSI TR-03110 Advanced Security Mechanisms for Machine Readable Travel Documents Mar. 2012."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_24"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69485-4_15"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"A.\n       \n      Leicher A.\n       \n      Schmidt and \n      \n      \n      Y.\n       \n      Shah\n      \n  \n  . \n  Smart\n   OpenID: A Smart Card Based OpenID Protocol. In Information Security and Privacy Research volume \n  376\n   of \n  IFIP Advances in Information and Communication Technology pages \n  75\n  --\n  86\n  . \n  Springer Berlin Heidelberg 2012\n  .  A. Leicher A. Schmidt and Y. Shah. Smart OpenID: A Smart Card Based OpenID Protocol. In Information Security and Privacy Research volume 376 of IFIP Advances in Information and Communication Technology pages 75--86. Springer Berlin Heidelberg 2012.","DOI":"10.1007\/978-3-642-30436-1_7"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAR-SSI.2011.5931373"}],"event":{"name":"CODASPY'14: Fourth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"San Antonio Texas USA","acronym":"CODASPY'14"},"container-title":["Proceedings of the 4th ACM conference on Data and application security and privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557593","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557547.2557593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:50Z","timestamp":1750234190000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557593"}},"subtitle":["trustworthy identities for untrusted mobile devices"],"short-title":[],"issued":{"date-parts":[[2014,3,3]]},"references-count":13,"alternative-id":["10.1145\/2557547.2557593","10.1145\/2557547"],"URL":"https:\/\/doi.org\/10.1145\/2557547.2557593","relation":{},"subject":[],"published":{"date-parts":[[2014,3,3]]},"assertion":[{"value":"2014-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}