<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-04-17T17:40:20.990Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:2:619" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:2:619</identifier>
                <datestamp>2013-10-27T20:13:34Z</datestamp>
                <setSpec>2</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">Zloupotreba sertifikata u servisu elektronske pošte</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2011</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/2/619</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://www.singipedia.com/content/3035-Zloupotreba-sertifikata-u-servisu-elektronske-po%C5%A1te</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0001-6136-1895" confidence="-1">M. Veinović</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:1896" confidence="-1">N. Ivaniš</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">This paper considers the problem of user certificate abuse after identity theft (username and password) in the systems with PKI support for trusted electronic communications. The problem occurs when the attacker, with stolen identity, applies to the certification authority for a certificate and when that certification authority issues him a valid certificate. Only one certificate, with one username and password should be issued to only one user. Experimental analysis has been carried out in a selected testing environment for e-mail applications. </dim:field>
                    <dim:field mdschema="dc" element="type">article</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="volume">8</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="issue">2</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="spage">79</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="epage">86</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="issn">1820-8819</dim:field>
                    <dim:field mdschema="dc" element="source">Singidunum revija</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
