{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:17Z","timestamp":1725494417334},"publisher-location":"Boston, MA","reference-count":6,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387723662"},{"type":"electronic","value":"9780387723679"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_38","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T23:12:08Z","timestamp":1194649928000},"page":"443-448","source":"Crossref","is-referenced-by-count":12,"title":["Covert Identity Information in Direct Anonymous Attestation (DAA)"],"prefix":"10.1007","author":[{"given":"Carsten","family":"Rudolph","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","unstructured":"R. Anderson. \u2018trusted computing\u2019 frequently asked questions. \n                    http:\/\/www.cl.cam.ac.uk\/rjaM\/tcparfaq.html\n                    \n                  , 2003."},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"E. Brickell, J. Camenisch, and L. Chen. Direct anonymous attestation. In 11th ACM Conference on Computer and Communications Security. ACM Press, 2004.","DOI":"10.1145\/1030083.1030103"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"J. Camenisch. Better privacy for trusted computing platforms. In 9th European Symposium On Research in Computer Security (ESORICS 2004), 2004.","DOI":"10.1007\/978-3-540-30108-0_5"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In Security in Communication Networks, Third International Conference, SCN 2003, volume 2576 of Lecture Notes in Computer Science, pages 268\u2013289. Springer Verlag, 2003.","DOI":"10.1007\/3-540-36413-7_20"},{"key":"38_CR5","unstructured":"Trusted Computing Group. TCG TPM Specification 1.2 revision 94. \n                    http:\/\/www.trustedcomputing.org\n                    \n                  , 2006."},{"key":"38_CR6","unstructured":"M. Hansen. A double-edged blade \u2014 on trusted computing\u2019s impact on privacy. In Datenschutz und Datensicherheit, pages 525-528, 2004."}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T03:16:50Z","timestamp":1551064610000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_38","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2007]]}}}