{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:10:09Z","timestamp":1763467809151,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540443452"},{"type":"electronic","value":"9783540458531"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45853-0_5","type":"book-chapter","created":{"date-parts":[[2007,5,3]],"date-time":"2007-05-03T20:42:13Z","timestamp":1178224933000},"page":"72-89","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Outbound Authentication for Programmable Secure Coprocessors"],"prefix":"10.1007","author":[{"given":"Sean W.","family":"Smith","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,26]]},"reference":[{"key":"5_CR1","unstructured":"R. Anderson. Invited lecture, A CM CCS, 1997. The definitive written record appears to be Two Remarks on Public Key Cryptology, \n                  http:\/\/www.ftp.cl.cam.ac.uk\/ftp\/users\/rja14\/forwardsecure.pdf\n                  \n                ."},{"key":"5_CR2","unstructured":"W. A. Arbaugh, D. J. Farber, J. M. Smith. \u201cA Secure and Reliable Bootstrap Architecture.\u201d IEEE Computer Society Conference on Security and Privacy. 1997."},{"key":"5_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Privacy Enhancing Technology 2002","author":"D. Asonov","year":"2003","unstructured":"D. Asonov and J. Freytag. \u201cAlmost Optimal Private Information Retrieval.\u201d Privacy Enhancing Technology 2002. Springer-Verlag LNCS."},{"key":"5_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Crypto 99","author":"M. Bellare","year":"1999","unstructured":"M. Bellare and S. Miner. \u201cA Forward-Secure Digital Signature Scheme.\u201d Extended abstract appears in Crypto 99, Springer-Verlag LNCS. Full version at \n                  http:\/\/www-cse.ucsd.edu\/~mihir\/papers\/fsig.html\n                  \n                ."},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"M. Bond, R. Anderson. \u201cAPI-Level Attacks on Embedded Systems.\u201d IEEE Computer. 34:67\u201375. October 2001.","DOI":"10.1109\/2.955101"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/188280.188371","volume":"37","author":"L. Clark","year":"1994","unstructured":"L. Clark and L. J. Hoffmann. \u201cBITS: A Smartcard Protected Operating System.\u201d Communications of the ACM. 37: 66\u201370. 1994.","journal-title":"Communications of the ACM"},{"key":"5_CR7","unstructured":"J. Dyer, R. Perez, S.W. Smith, M. Lindemann. \u201cApplication Support Architecture for a High-Performance, Programmable Secure Coprocessor.\u201d 22nd National Information Systems Security Conference. October 1999."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"J. Dyer, M. Lindemann, R. Perez, R. Sailer, S.W. Smith, L. van Doorn, S. Weingart. \u201cBuilding the IBM 4758 Secure Coprocessor.\u201d IEEE Computer, 34:57\u201366. October 2001.","DOI":"10.1109\/2.955100"},{"key":"5_CR9","unstructured":"P. England, J. DeTreville and B. Lampson. Digital Rights Management Operating System. United States Patent 6,330,670. December 2001."},{"key":"5_CR10","unstructured":"P. England, J. DeTreville and B. Lampson. Loading and Identifying a Digital Rights Management Operating System. United States Patent 6,327,652. December 2001."},{"key":"5_CR11","series-title":"Lect Notes Comput Sci","first-page":"2002","volume-title":"7th Australasian Conference on Information Security and Privacy","author":"P. England","year":"2002","unstructured":"P. England, M. Peinado. \u201cAuthenticated Operation of Open Computing Devices. \u201d 7th Australasian Conference on Information Security and Privacy. Springer-Verlag LNCS2384. June 2002."},{"key":"5_CR12","unstructured":"\u201cIBM Research Demonstrates Linux Running on Secure Cryptographic Coprocessor. \u201d Press release, August 28, 2001."},{"key":"5_CR13","series-title":"Lect Notes Comput Sci","volume-title":"Privacy Enhancing Technology 2002","author":"A. Iliev","year":"2003","unstructured":"A. Iliev, S. W. Smith. \u201cPrototyping an Armored Data Vault: Rights Management for Big Brother\u2019s Computer.\u201c Privacy Enhancing Technology 2002. Springer-Verlag LNCS."},{"key":"5_CR14","unstructured":"S. Jiang, S.W. Smith, K. Minami. \u201cSecuring Web Servers against Insider Attack. \u201d ACSA\/ACM Annual Computer Security Applications Conference. December 2001."},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/49.839931","volume":"18","author":"R. Kohlas","year":"2000","unstructured":"R. Kohlas and U. Maurer. \u201cReasoning About Public-Key Certification: On Bindings Between Entities and Public Keys.\u201d Journal on Selected Areas in Communications. 18: 551\u2013560. 2000. (A preliminary version appeared in Financial Cryptography 99, Springer-Verlag.).","journal-title":"Journal on Selected Areas in Communications"},{"key":"5_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-68339-9","volume-title":"ESORICS 1996","author":"U. Maurer","year":"1996","unstructured":"U. Maurer. \u201cModelling a Public-Key Infrastructure.\u201d ESORICS 1996. Springer-Verlag LNCS."},{"key":"5_CR17","unstructured":"S.W. Smith. Secure Coprocessing Applications and Research Issues. Los Alamos Unclassified Release LA-UR-96-2805, Los Alamos National Laboratory. August 1996."},{"key":"5_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0030438","volume-title":"Proceedings, Second International Conference on Financial Cryptography","author":"S.W. Smith","year":"1998","unstructured":"S.W. Smith, E. R. Palmer, S.H. Weingart. \u201cUsing a High-Performance, Programmable Secure Coprocessor.\u201d Proceedings, Second International Conference on Financial Cryptography. Springer-Verlag LNCS, 1998."},{"key":"5_CR19","first-page":"683","volume":"40","author":"S.W. Smith","year":"2001","unstructured":"S.W. Smith, D. Safford. \u201cPractical Server Privacy Using Secure Coprocessors.\u201d IBM Systems Journal (special issue on End-to-End Security) 40: 683\u2013695. 2001.","journal-title":"IBM Systems Journal (special issue on End-to-End Security)"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"S.W. Smith, S.H. Weingart. \u201cBuilding a High-Performance, Programmable Secure Coprocessor.\u201d Computer Networks (Special Issue on Computer Network Security). 31: 831\u2013860. April 1999.","DOI":"10.1016\/S1389-1286(98)00019-X"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Trusted Computing Platform Alliance. TCPA Design Philosophies and Concepts, Version 1.0. January, 2001.","DOI":"10.1016\/S1353-4858(01)00312-9"},{"key":"5_CR22","unstructured":"J.D. Tygar and B.S. Yee. \u201cDyad: A System for Using Physically Secure Coprocessors. \u201d Proceedings of the Joint Harvard-MIT Workshop on Technological Strategies for the Protection of Intellectual Property in the Network Multimedia Environment. April 1993."},{"key":"5_CR23","unstructured":"N. van Someren. \u201cAccess Control for Secure Execution.\u201d RSA Conference 2001."},{"key":"5_CR24","unstructured":"B.S. Yee. Using Secure Coprocessors. Ph.D. thesis. Computer Science Technical Report CMU-CS-94-149, Carnegie Mellon University. May 1994."},{"key":"5_CR25","unstructured":"B. S. Yee and J. D. Tygar. \u201cSecure Coprocessors in Electronic Commerce Applications. \u201d 1st USENIX Electronic Commerce Workshop. 1996."},{"key":"5_CR26","unstructured":"B.S. Yee. A Sanctuary For Mobile Agents. Computer Science Technical Report CS97-537, UCSD, April 1997. (An earlier version of this paper appeared at the DARPA Workshop on Foundations for Secure Mobile Code.)."}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45853-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:09:20Z","timestamp":1559506160000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45853-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540443452","9783540458531"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/3-540-45853-0_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"26 September 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}