{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:01:23Z","timestamp":1725559283044},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540258094"},{"type":"electronic","value":"9783540320173"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11422778_13","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T20:01:28Z","timestamp":1279051288000},"page":"154-165","source":"Crossref","is-referenced-by-count":1,"title":["Using Secure Coprocessors to Protect Access to Enterprise Networks"],"prefix":"10.1007","author":[{"given":"Haidong","family":"Xia","sequence":"first","affiliation":[]},{"given":"Jayashree","family":"Kanchana","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Carlos","family":"Brustoloni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Cisco: Network Admission Control [Online], http:\/\/www.cisco.com\/en\/US\/netsol\/ns466\/networking_solutions_sub_solution_home.html"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Dierks, T., Allen, C.: The TLS Protocol Version 1.0. IETF, RFC 2246 (January 1999) [Online], ftp:\/\/ftp.rfc-editor.org\/in-notes\/rfc2246.txt","DOI":"10.17487\/rfc2246"},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. Transactions on Information Theory\u00a022, 644\u2013654 (1976)","journal-title":"Transactions on Information Theory"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Felten, E.: Understanding Trusted Computing. Security and Privacy, 60\u201362. IEEE (May\/June 2003), http:\/\/www.princeton.edu\/~echi\/ele572\/Felten%20-%20Understanding%20trusted%20computing.pdf","DOI":"10.1109\/MSECP.2003.1203224"},{"key":"13_CR5","unstructured":"FreeRADIUS: Homepage [Online], http:\/\/www.freeradius.org\/"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A Virtual Machine-Based Platform for Trusted Computing. In: Proc. 19th Symposium on Operating System Principles, ACM, New York (2003) [Online], http:\/\/www.stanford.edu\/","DOI":"10.1145\/945445.945464"},{"key":"13_CR7","unstructured":"IEEE: Port-Based Network Access Control. 802.1x Std. (2001) [Online], http:\/\/standards.ieee.org\/getieee802\/download\/802.1X-2001.pdf"},{"key":"13_CR8","unstructured":"Marchesini, J., Smith, S., Wild, O., Stabiner, J., Barsamian, A.: Open-Source Applications of TCPA Hardware. In: Proc. 20th Annual Computer Security Applications Conference, ACSAC (December 2004) [Online], http:\/\/www.cs.dartmouth.edu\/~carlo\/research\/bearapps\/bearapps.pdf"},{"key":"13_CR9","unstructured":"Microsoft: Network Access Protection [Online], http:\/\/www.microsoft.com\/windowsserver2003\/technologies\/networking\/nap\/default.mspx"},{"key":"13_CR10","unstructured":"Microsoft: Next Generation Secure Computing Base \u2013 Technical FAQ (July 2003) [Online], http:\/\/www.microsoft.com\/technet\/security\/news\/ngscb.mspx"},{"key":"13_CR11","unstructured":"NIST: Secure Hash Standard. Federal Information Processing Standards Pub. 180-1 (April 1995) [Online], http:\/\/www.itl.nist.gov\/fipspubs\/fip180-1.htm"},{"key":"13_CR12","unstructured":"Open1x: Homepage [Online], http:\/\/www.open1x.org\/"},{"key":"13_CR13","unstructured":"Palekar, A., Simon, D., Salowey, J., Zhou, H., Zorn, G., Josefsson, S.: Protected EAP Protocol (PEAP) Version 2. IETF. Internet Draft (October 2004) [Online], ftp:\/\/ftp.rfc-editor.org\/in-notes\/internet-drafts\/draft-josefsson-pppext-eap-tls-eap-10.txt"},{"volume-title":"Trusted Computing Platforms \u2013 TCPA Technology in Context","year":"2003","key":"13_CR14","unstructured":"Pearson, S. (ed.): Trusted Computing Platforms \u2013 TCPA Technology in Context. Prentice Hall, Englewood Cliffs (2003)"},{"key":"13_CR15","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: Proc. Security Symposium, USENIX (August 2004) [Online], http:\/\/www.usenix.org\/publications\/library\/proceedings\/sec04\/"},{"key":"13_CR16","volume-title":"Proc. 11th Conference on Computer and Communications Security (CCS)","author":"R. Sailer","year":"2004","unstructured":"Sailer, R., Jaeger, T., Zhang, X., van Doorn, L.: Attestation-based Policy Enforcement for Remote Access. In: Proc. 11th Conference on Computer and Communications Security (CCS). ACM, New York (2004), http:\/\/portal.acm.org\/citation.cfm?id=1030083.1030125"},{"key":"13_CR17","unstructured":"Tripwire.org: Homepage [Online], http:\/\/www.tripwire.org\/"},{"key":"13_CR18","unstructured":"Trusted Computing Group: Homepage [Online], https:\/\/www.trustedcomputinggroup.org\/home"},{"key":"13_CR19","unstructured":"Trusted Computing Group: Trusted Computing Platform Alliance (TCPA) Main Specification Version 1.1b [Online], https:\/\/www.trustedcomputinggroup.org\/downloads\/Main_TCG_Architecture_v1_1b.zip"},{"key":"13_CR20","unstructured":"Trusted Computing Group: Work Group Charter Summary (2004) [Online], https:\/\/www.trustedcomputinggroup.org\/downloads\/Work_Group_Charters_Summary.pdf"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11422778_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:52:09Z","timestamp":1605642729000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11422778_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540258094","9783540320173"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11422778_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}