{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:29:27Z","timestamp":1742984967206,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":20,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461479147"},{"type":"electronic","value":"9781461479154"}],"license":[{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-7915-4_4","type":"book-chapter","created":{"date-parts":[[2013,9,12]],"date-time":"2013-09-12T08:10:18Z","timestamp":1378973418000},"page":"71-93","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Introduction to the Trusted Platform Module and Mobile Trusted Module"],"prefix":"10.1007","author":[{"given":"Raja Naeem","family":"Akram","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Konstantinos","family":"Markantonakis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Keith","family":"Mayes","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2013,9,13]]},"reference":[{"key":"4_CR1","unstructured":"TPM Main: Part 1 Design Principles, Online, Trusted Computing Group (TCG) Specification 1.2, Rev. 116, March 2011."},{"key":"4_CR2","unstructured":"ISO\/IEC 11889\u20131: Information Technology - Trusted Platform Module - Part 1: Overview, Online, International Organization for Standardization (ISO) Standard 11 889\u20131, May 2009."},{"key":"4_CR3","unstructured":"Standard Specifications for Public Key Cryptography, Online, Institute for Electrical and Electronics Engineers (IEEE) Standard 1363\u20132000, January 2000."},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-Hashing for Message Authentication, Online, Network Working Group Requst for Comments 2104, February 1997.","DOI":"10.17487\/rfc2104"},{"key":"4_CR5","unstructured":"FIPS 180\u20132: Secure Hash Standard (SHS), National Institute of Standards and Technology (NIST) Std., 2002."},{"key":"4_CR6","unstructured":"TPM Main: Part 3 Commands, Online, Trusted Computing Group (TCG) Specification 1.2, Rev. 116, March 2011."},{"key":"4_CR7","unstructured":"ISO\/IEC 11889\u20132: Information technology - Trusted Platform Module - Part 2: Design principles, International Organization for Standardization (ISO) Std., May 2009."},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"E. Brickell, J. Camenisch, L. Chen, \u201cDirect anonymous attestation\u201d, in Proceedings of the 11th ACM conference on Computer and communications security, ser. CCS \u201904. New York, NY, USA: ACM, 2004, pp. 132\u2013145. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/1030083.1030103","DOI":"10.1145\/1030083.1030103"},{"key":"4_CR9","unstructured":"\u201cIntel Trusted Execution Technology (Intel TXT)\u201d, Intel Corporation, Software Development Guide 315168\u2013008, March 2011. [Online]. Available: http:\/\/download.intel.com\/technology\/security\/downloads\/315168.pdf"},{"key":"4_CR10","unstructured":"TCG Mobile Trusted Module Specification, Online, Trusted Computing Group (TCG) Specification 1.0, Rev. 6, June 2008."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"P. Wilson, A. Frey, T. Mihm, D. Kershaw, and T. Alves, \u201cImplementing Embedded Security on Dual-Virtual-CPU Systems\u201d, IEEE Design and Test of Computers, vol. 24, pp. 582\u2013591, 2007.","DOI":"10.1109\/MDT.2007.196"},{"key":"4_CR12","unstructured":", \u201cARM Security Technology: Building a Secure System using TrustZone Technology\u201d, ARM, White Paper PRD29-GENC-009492C, 2009."},{"key":"4_CR13","unstructured":"\u2014, \u201cM-Shield Mobile Security Technology: Making Wireless Secure\u201d, Texas Instruments, Whilte Paper, February 2008."},{"key":"4_CR14","unstructured":"GlobalPlatform Device Technology: Device Application Security Management - Concepts and Description Document Specification, Online, GlobalPlatform Specification, April 2008."},{"key":"4_CR15","unstructured":", \u201cGlobalPlatform Device: GPD\/STIP Specification Overview\u201d, GlobalPlatform, Specification Version 2.3, August 2007."},{"key":"4_CR16","unstructured":"GlobalPlatform: GlobalPlatform Card Specification, Version 2.2,, GlobalPlatform Std., March 2006."},{"key":"4_CR17","unstructured":"F. C. Bormann, L. Manteau, A. Linke, J. C. Pailles, and J. D. van, \u201cConcept for Trusted Personal Devices in a Mobile and Networked Environment\u201d, in 15th IST Mobile & Wireless Communications Summit, June 2006."},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"R. N. Akram, K. Markantonakis, and K. Mayes, \u201cA Paradigm Shift in Smart Card Ownership Model\u201d, in Proceedings of the 2010 International Conference on Computational Science and Its Applications (ICCSA 2010), B. O. Apduhan, O. Gervasi, A. Iglesias, D. Taniar, and M. Gavrilova, Eds. Fukuoka, Japan: IEEE Computer Society, March 2010, pp. 191\u2013200.","DOI":"10.1109\/ICCSA.2010.52"},{"key":"4_CR19","unstructured":"\u2014, \u201cUser Centric Security Model for Tamper-Resistant Devices\u201d, in 8th IEEE International Conference on e-Business Engineering (ICEBE 2011), J. Li and J.-Y. Chung, Eds. Beijing, China: IEEE Computer Science, October 2011."},{"key":"4_CR20","unstructured":"Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and General Model, Part 2: Security Functional Requirements, Part 3: Security Assurance Requirements, Common Criteria Std. Version 3.1, August 2006."}],"container-title":["Secure Smart Embedded Devices, Platforms and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-7915-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T04:28:46Z","timestamp":1674880126000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-7915-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,13]]},"ISBN":["9781461479147","9781461479154"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-7915-4_4","relation":{},"subject":[],"published":{"date-parts":[[2013,9,13]]},"assertion":[{"value":"13 September 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}