{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T04:26:01Z","timestamp":1745209561743},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438618"},{"type":"electronic","value":"9783540454502"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45450-0_27","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T20:53:10Z","timestamp":1179607990000},"page":"346-361","source":"Crossref","is-referenced-by-count":11,"title":["Authenticated Operation of Open Computing Devices"],"prefix":"10.1007","author":[{"given":"Paul","family":"England","sequence":"first","affiliation":[]},{"given":"Marcus","family":"Peinado","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"27_CR1","unstructured":"DOD 5200.28-STD. Department of defense trusted computer system evaluation criteria. December 1985."},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Trusted Computing Platform Alliance. TCPA main specification version 1.1. http:\/\/www.trustedpc.org , 2001.","DOI":"10.1016\/S1353-4858(01)00312-9"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"W. A. Arbaugh, D. J. Faber, and J. M. Smith. A secure and reliable bootstrap architecture. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 65\u201371, 1997.","DOI":"10.1109\/SECPRI.1997.601317"},{"key":"27_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/3-540-61996-8_49","volume-title":"Information hiding: first international workshop, Cambridge, U.K.","author":"D. Aucsmith","year":"1996","unstructured":"D. Aucsmith. Tamper-resistant software: An implementation. In Ross Anderson, editor, Information hiding: first international workshop, Cambridge, U.K., volume 1174 of Lecture Notes in Computer Science, pages 317\u2013333. Springer-Verlag, 1996."},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Advances in Cryptology-CRYPTO 2001, pages 1\u201318. Springer-Verlag, 2001.","DOI":"10.1007\/3-540-44647-8_1"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Advances in Cryptology-Crypto\u201996, number 1109 in Lecture Notes in CS, 1996.","DOI":"10.1007\/3-540-68697-5_1"},{"key":"27_CR7","unstructured":"P. England, J. DeTreville, and B. Lampson. A trusted open platform. Unpublished."},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"N. Itoi, W. A. Arbaugh, S. J. Pollack, and D. M. Reeves. Personal secure booting. In V. Varadharajan and Y. Mu, editors, Information Security and Privacy-6th Australasian Conference, ACISP 2001. Springer-Verlag, 2001.","DOI":"10.1007\/3-540-47719-5_12"},{"issue":"1","key":"27_CR9","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/775265.775268","volume":"8","author":"B. Lampson","year":"1974","unstructured":"B. Lampson. Protection. ACM Operating Systems Review, 8(1):18\u201324, 1974.","journal-title":"ACM Operating Systems Review"},{"key":"27_CR10","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B. Lampson","year":"1992","unstructured":"B. Lampson, M. Abadi, and M. Burrows. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10:265\u2013310, November 1992.","journal-title":"ACM Transactions on Computer Systems"},{"key":"27_CR11","unstructured":"A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997."},{"key":"27_CR12","unstructured":"S. W. Smith and V. Austel. Trusting trusted hardware: Towards a formal model for programmable secure coprocessors. In Proceedings of the Third USENIX Workshop on Electronic Commerce, pages 83\u201398, 1998."},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"S. W. Smith, E. R. Palmer, and S. Weingart. Using a high-performance, programmable secure coprocessor. In Proceedings of the Second International Conference on Financial Cryptography. Springer-Verlag, 1998.","DOI":"10.1007\/BFb0055474"},{"issue":"8","key":"27_CR14","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1016\/S1389-1286(98)00019-X","volume":"31","author":"S. W. Smith","year":"1999","unstructured":"S. W. Smith and S. Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks, 31(8):831\u2013860, April 1999.","journal-title":"Computer Networks"},{"key":"27_CR15","unstructured":"B. Yee. Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, 1994."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45450-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T05:39:18Z","timestamp":1556429958000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45450-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438618","9783540454502"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-45450-0_27","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}