{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:47:28Z","timestamp":1725893248771},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642294198"},{"type":"electronic","value":"9783642294204"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29420-4_9","type":"book-chapter","created":{"date-parts":[[2012,6,25]],"date-time":"2012-06-25T13:12:33Z","timestamp":1340629953000},"page":"131-147","source":"Crossref","is-referenced-by-count":3,"title":["Concepts and Proofs for Configuring PKCS#11"],"prefix":"10.1007","author":[{"given":"Sibylle","family":"Fr\u00f6schle","sequence":"first","affiliation":[]},{"given":"Nils","family":"Sommer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Anderson, R.: Security Engineering. Wiley Publishing, Inc. (2008)"},{"key":"9_CR2","unstructured":"Bond, M.: Understanding Security APIs. Ph.D. thesis. University of Cambridge (2004)"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.istr.2006.03.003","volume":"11","author":"M. Bond","year":"2006","unstructured":"Bond, M., Clulow, J.: Integrity of intention. Inf. Secur. Tech. Rep.\u00a011, 93\u201399 (2006)","journal-title":"Inf. Secur. Tech. Rep."},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Bortolozzo, M., Centenaro, M., Focardi, R., Steel, G.: Attacking and fixing PKCS#11 security tokens. In: CCS 2010, pp. 260\u2013269. ACM (2010)","DOI":"10.1145\/1866307.1866337"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-540-45238-6_32","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"J. Clulow","year":"2003","unstructured":"Clulow, J.: On the Security of PKCS #11. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 411\u2013425. Springer, Heidelberg (2003)"},{"issue":"6","key":"9_CR6","doi-asserted-by":"crossref","first-page":"1211","DOI":"10.3233\/JCS-2009-0394","volume":"18","author":"S. Delaune","year":"2010","unstructured":"Delaune, S., Kremer, S., Steel, G.: Formal security analysis of PKCS#11 and proprietary extensions. Journal of Computer Security\u00a018(6), 1211\u20131245 (2010)","journal-title":"Journal of Computer Security"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-642-19751-2_7","volume-title":"Formal Aspects of Security and Trust","author":"S. Fr\u00f6schle","year":"2011","unstructured":"Fr\u00f6schle, S., Sommer, N.: Reasoning with Past to Prove PKCS#11 Keys Secure. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol.\u00a06561, pp. 96\u2013110. Springer, Heidelberg (2011)"},{"key":"9_CR8","unstructured":"Fr\u00f6schle, S., Sommer, N.: When is a PKCS#11 configuration secure? Reports of SFB\/TR 14 AVACS\u00a082, SFB\/TR 14 AVACS (to appear)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-642-03459-6_7","volume-title":"Foundations and Applications of Security Analysis","author":"S. Fr\u00f6schle","year":"2009","unstructured":"Fr\u00f6schle, S., Steel, G.: Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data. In: Degano, P., Vigan\u00f2, L. (eds.) ARSPA-WITS 2009. LNCS, vol.\u00a05511, pp. 92\u2013106. Springer, Heidelberg (2009)"},{"key":"9_CR10","unstructured":"RSA Laboratories: PKCS#11: Cryptographic Token Interface Standard, vol. v2.30, Draft\u00a04. RSA Security Inc. (July 2009)"},{"key":"9_CR11","unstructured":"SafeNet, Inc.: Attacking and fixing PKCS#11 security tokens [4]: A response by SafeNet Inc., \n \n http:\/\/secgroup.ext.dsi.unive.it\/pkcs11-security"},{"key":"9_CR12","unstructured":"Sommer, N.: Experiment-based Analysis of PKCS#11. Master\u2019s thesis. University of Oldenburg (2009)"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects of Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29420-4_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:00:58Z","timestamp":1620126058000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29420-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642294198","9783642294204"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29420-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}