{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:02:12Z","timestamp":1763017332184,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":42,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461479147"},{"type":"electronic","value":"9781461479154"}],"license":[{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-7915-4_12","type":"book-chapter","created":{"date-parts":[[2013,9,12]],"date-time":"2013-09-12T08:10:18Z","timestamp":1378973418000},"page":"287-309","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Automotive Embedded Systems Applications and Platform Embedded Security Requirements"],"prefix":"10.1007","author":[{"given":"Jan","family":"Pelzl","sequence":"first","affiliation":[]},{"given":"Marko","family":"Wolf","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Wollinger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,9,13]]},"reference":[{"key":"12_CR1","unstructured":"K. Finkenzeller, RFID Handbook: Radio-Frequency identification fundamentals and applications, Wiley, 1999."},{"key":"12_CR2","unstructured":"European Technical Standards Institute (ETSI), http:\/\/www.etsi.org."},{"key":"12_CR3","unstructured":"M. Mouly, M-B Pautet, The GSM System for Mobile Communications, Cell & Sys. Correspondence 1992."},{"key":"12_CR4","unstructured":"Third Generation Partnership project (3GPP), http:\/\/www.3gpp.org"},{"key":"12_CR5","unstructured":"ETSI SAGE Group (originally), 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General, 3GPP TS 35.205."},{"key":"12_CR6","unstructured":"Security Algorithms Group of Experts (SAGE), www.portal.etsi.org\/sage\/."},{"key":"12_CR7","unstructured":"NIST, Advanced Encryption Standard, FIPS 197, 2001, http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"12_CR8","unstructured":"3GPP, Specification of the SIM Application Toolkit for the Subscriber Identity Module - Mobile Equipment (SIM - ME) interface (Release 1999) 3GPP TS 11.14 V8.18.0, 2007\u201306."},{"key":"12_CR9","unstructured":"The Java Card Forum http:\/\/www.JavaCardforum.org\/"},{"key":"12_CR10","unstructured":"3GPP, Security mechanisms for the (U)SIM application toolkit; Stage 2 (Release 5) TS 23.048 V5.9.0, 2005\u201306."},{"key":"12_CR11","unstructured":"GlobalPlatform, GlobalPlatform Card Specification, 2006."},{"key":"12_CR12","unstructured":"3GPP, Specification of the Subscriber Identity Module -Mobile Equipment (SIM - ME) interface (Release 1999) TS 11.11 V8.14.0 (2007\u201306)."},{"key":"12_CR13","unstructured":"International Standard Organisation, \u201cISO\/IEC 7816, Information technology - Identification cards - Integrated circuit(s) cards with contacts- Part 4 Interindustry commands for interchange\u201d, http:\/\/www.iso.org, 1995"},{"key":"12_CR14","unstructured":"David Wagner and Ian Goldberg, \u201cGSM Cloning\u201d, ISAAC Berkley, http:\/\/www.isaac.cs.berkeley.edu\/isaac\/gsm.html, 1998"},{"key":"12_CR15","unstructured":"Anderson Ross, Kuhn Markus, \u201cTamper resistance - a cautionary note \u201d, second USENIX workshop on electronic Commerce Nov 1996."},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Paul Kocher, \u201cTiming Attacks on Implementations of Diffie-Hellman RSA DSS and Other Systems\u201d, Advances in Cryptology - CRYPTO \u201996, LNCS 1109, 104\u2013113, 1996.","DOI":"10.1007\/3-540-68697-5_9"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Paul Kocher, Joshua Jaffe and Benjamin Jun,\u201cDifferntial Power Analysis, Advances in Cryptology - CRYPTO \u201999, LNCS1666, 388\u2013397, 1999.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"E. Biham, A. Shamir, \u201cDifferential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology\u201d, Vol. 4 No. 1, 1991.","DOI":"10.1007\/BF00630563"},{"key":"12_CR19","unstructured":"Kumar Sandeep et al, \u201cHow to break DES for \u20ac8,980 \u201d, CHES 2006, http:\/\/www.crypto.ruhr-uni-bochum.de"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Eli Biham, Adi Shamir, \u201cDifferential Fault Analusis of Secret Key Cryptosystems\u201d, Technicon Computer science dept - Technical report CS0910.revised, 1997.","DOI":"10.1007\/BFb0052259"},{"key":"12_CR21","unstructured":"Tiago Alves and Don Felton. TrustZone: Integrated hardware and software security: Enabling trusted computing in embedded systems. www.arm.com, July 2004."},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Mayes Keith and Markantonakis Konstantinos, On the potential of high density smart cards, Elsevier, Information Security Technical Report Vol11 No3 2006.","DOI":"10.1016\/j.istr.2006.05.002"},{"key":"12_CR23","unstructured":"Universal Serial Bus (USB) Forum, http:\/\/www.usb.org"},{"key":"12_CR24","unstructured":"Etsi, SCP Group, SCP Specifications, http:\/\/docbox.etsi.org\/scp\/scp\/Specs\/"},{"key":"12_CR25","unstructured":"Near Field Communication (NFC) Forum http:\/\/www.nfc-forum.org\/"},{"key":"12_CR26","unstructured":"GSM Association, http:\/\/www.gsmworld.com"},{"key":"12_CR27","unstructured":"Trusted Computing Group, http:\/\/www.trustedcomputinggroup.org"},{"key":"12_CR28","unstructured":"TCG. TCG Specification Architecture Overview. Trusted Computing Group, 1.2 edition, April 2004."},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"R. L. Rivest, A. Shamir, L. M. Adelman. A method for obtaining digital signatures and public key cryptosystems. Technical, Report MIT\/LCS\/TM-82, 1977.","DOI":"10.21236\/ADA606588"},{"key":"12_CR30","unstructured":"National Institute of Standards. Secure hash standard. Federal Information Processing Standards (FIPS) 180\u20131, 1995."},{"key":"12_CR31","unstructured":"ISO\/IEC. ISO\/IEC 10118\u20133 Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions. International Organization for Standardization, http:\/\/www.iso.org, 2004"},{"issue":"1","key":"12_CR32","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/TC.2007.250627","volume":"56","author":"Berk Sunar","year":"2007","unstructured":"Berk Sunar, William J. Martin, and Douglas R. Stinson. A provably secure true random number generator with built-in tolerance to active attacks. IEEE Transactions on Computers, 56(1):109\u2013119, 2007.","journal-title":"IEEE Transactions on Computers"},{"key":"12_CR33","volume-title":"editor","author":"CJ Mitchell","year":"2005","unstructured":"C J Mitchell, editor. Trusted Computing. IEE Press, 2005."},{"key":"12_CR34","unstructured":"Roger L. Kay. How to implement trusted computing, a guide to tighter enterprise security. https:\/\/www.trustedcomputinggroup.org\/news\/Industry_Data\/Implementing_Trusted_Computing_RK.pdf. Endpoint Technologies Associates"},{"key":"12_CR35","unstructured":"Roger L. Kay. Trusted computing is real and it\u2019s here. https:\/\/www.trustedcomputinggroup.org\/news\/Industry_Data\/Endpoint_Technologies_Associates_TCG_report_Jan_29_2007.pdf"},{"key":"12_CR36","unstructured":"Trusted Computing Group. Embedded systems and trusted computing security. https:\/\/www.trustedcomputinggroup.org\/groups\/tpm\/embedded_bkgdr_final_sept_14_2005.pdf"},{"key":"12_CR37","unstructured":"International Organization for Standardization. ISO\/IEC 15408: Information Technology- Security Techniques- Evaluation Criteria for IT, Security, 1999."},{"key":"12_CR38","unstructured":"Trusted Computer Group, Mobile Trusted Module Specification 1.0. June 2007."},{"key":"12_CR39","unstructured":"Trusted Computing Group. Mobile Trusted Module Specification faq - general overview. www.trustedcomputinggroup.org, June 2007."},{"key":"12_CR40","unstructured":"Mobile Phone Working Group. Use case scenarios v 2.7. https:\/\/www.trustedcomputinggroup.org\/groups\/mobile\/Final_use_cases_sept_22_%2005.pdf, 2005."},{"key":"12_CR41","unstructured":"DELL. Securing network-based client computing: User and machine security. Dell\u2019s Technology White Papers, 2004."},{"key":"12_CR42","unstructured":"Eimear Gallery, \u201cTrusted computing technologies and their use in the provision of high assurance SDR platforms\u201d, SDR Technical Conference, Orlando, USA, 13\u201317 November, 2006."}],"container-title":["Secure Smart Embedded Devices, Platforms and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-7915-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T02:18:54Z","timestamp":1676341134000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-7915-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,13]]},"ISBN":["9781461479147","9781461479154"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-7915-4_12","relation":{},"subject":[],"published":{"date-parts":[[2013,9,13]]},"assertion":[{"value":"13 September 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}