{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:57:34Z","timestamp":1742914654888,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030262495"},{"type":"electronic","value":"9783030262501"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-26250-1_17","type":"book-chapter","created":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T19:02:43Z","timestamp":1567364563000},"page":"210-222","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["CarINA - Car Sharing with IdeNtity Based Access Control Re-enforced by TPM"],"prefix":"10.1007","author":[{"given":"Bogdan","family":"Groza","sequence":"first","affiliation":[]},{"given":"Lucian","family":"Popa","sequence":"additional","affiliation":[]},{"given":"Pal-Stefan","family":"Murvay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,9]]},"reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/11513988_27","volume-title":"Computer Aided Verification","author":"A Armando","year":"2005","unstructured":"Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281\u2013285. Springer, Heidelberg (2005). \n                      https:\/\/doi.org\/10.1007\/11513988_27"},{"key":"17_CR2","unstructured":"Brandl, H.: Trusted Computing: The TCG Trusted Platform Module Specification. In: Embedded Systems. New Munich Trade Fair Centre (2004). \n                      http:\/\/opensgug.net\/utilisec\/embedded\/Shared%20Documents\/Device%20Security\/VariousInputs\/ShrinathInputs\/Basic_Knowledge_EC2004.pdf\n                      \n                    . Accessed 3 May 2019"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Busold, C., et al.: Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 233\u2013242. ACM (2013)","DOI":"10.1145\/2435349.2435382"},{"key":"17_CR4","unstructured":"Developer Community: TCG TPM2 Software Stack. \n                      https:\/\/github.com\/tpm2-software\/tpm2-tss\n                      \n                    . Accessed 15 April 2019"},{"key":"17_CR5","unstructured":"Developer Community: The source repository for the TPM (Trusted Platform Module) 2 tools. \n                      https:\/\/github.com\/tpm2-software\/tpm2-tools\n                      \n                    . Accessed 15 April 2019"},{"key":"17_CR6","unstructured":"Developer Community: TPM2 Access Broker and Resource Management Daemon. \n                      https:\/\/github.com\/tpm2-software\/tpm2-abrmd\n                      \n                    . Accessed 15 April 2019"},{"issue":"2","key":"17_CR7","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theor. 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"17_CR8","unstructured":"Francillon, A., Danev, B., Capkun, S.: Relay attacks on passive keyless entry and start systems in modern cars. In: NDSS (2011)"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Glas, B., Sander, O., Stuckert, V., Muller-Glaser, K.D., Becker, J.: Car-to-car communication security on reconfigurable hardware. In: VTC Spring 2009-IEEE 69th Vehicular Technology Conference, pp. 1\u20135. IEEE (2009)","DOI":"10.1109\/VETECS.2009.5073433"},{"key":"17_CR10","unstructured":"Goldman, K.: IBM\u2019s Software TPM 2.0. \n                      https:\/\/sourceforge.net\/projects\/ibmswtpm2\/\n                      \n                    . Accessed 15 April 2019"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-540-79966-5_8","volume-title":"Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks","author":"G Guette","year":"2008","unstructured":"Guette, G., Bryce, C.: Using TPMs to secure vehicular ad-hoc networks (VANETs). In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds.) WISTP 2008. LNCS, vol. 5019, pp. 106\u2013116. Springer, Heidelberg (2008). \n                      https:\/\/doi.org\/10.1007\/978-3-540-79966-5_8"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/0-387-34799-2_16","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 88","author":"LC Guillou","year":"1990","unstructured":"Guillou, L.C., Quisquater, J.-J.: A \u201cParadoxical\u201d indentity-based signature scheme resulting from zero-knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 216\u2013231. Springer, New York (1990). \n                      https:\/\/doi.org\/10.1007\/0-387-34799-2_16"},{"issue":"4","key":"17_CR13","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/S1389-1286(01)00165-7","volume":"36","author":"LC Guillou","year":"2001","unstructured":"Guillou, L.C., Ugon, M., Quisquater, J.J.: Cryptographic authentication protocols for smart cards. Comput. Netw. 36(4), 437\u2013451 (2001)","journal-title":"Comput. Netw."},{"key":"17_CR14","unstructured":"Infineon: Optiga TPM SLB 9670XQ2.0. \n                      https:\/\/www.infineon.com\/cms\/en\/product\/security-smart-card-solutions\/optiga-embedded-security-solutions\/optiga-tpm\/slb-9670xq2.0\/\n                      \n                    . Accessed 22 April 2019"},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985). \n                      https:\/\/doi.org\/10.1007\/3-540-39568-7_5"},{"issue":"5","key":"17_CR16","doi-asserted-by":"publisher","first-page":"2181","DOI":"10.1109\/TII.2017.2776250","volume":"14","author":"M Steger","year":"2018","unstructured":"Steger, M., et al.: An efficient and secure automotive wireless software update framework. IEEE Trans. Ind. Inf. 14(5), 2181\u20132193 (2018)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/978-3-319-66399-9_26","volume-title":"Computer Security \u2013 ESORICS 2017","author":"I Symeonidis","year":"2017","unstructured":"Symeonidis, I., Aly, A., Mustafa, M.A., Mennink, B., Dhooghe, S., Preneel, B.: SePCAR: a secure and privacy-enhancing protocol for car access provision. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 475\u2013493. Springer, Cham (2017). \n                      https:\/\/doi.org\/10.1007\/978-3-319-66399-9_26"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-642-35371-0_8","volume-title":"Trusted Systems","author":"S Tillich","year":"2012","unstructured":"Tillich, S., W\u00f3jcik, M.: Security analysis of an open car immobilizer protocol stack. In: Mitchell, C.J., Tomlinson, A. (eds.) INTRUST 2012. LNCS, vol. 7711, pp. 83\u201394. Springer, Heidelberg (2012). \n                      https:\/\/doi.org\/10.1007\/978-3-642-35371-0_8"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/11805618_21","volume-title":"Term Rewriting and Applications","author":"M Turuani","year":"2006","unstructured":"Turuani, M.: The CL-atse protocol analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol. 4098, pp. 277\u2013286. Springer, Heidelberg (2006). \n                      https:\/\/doi.org\/10.1007\/11805618_21"},{"key":"17_CR20","unstructured":"Verdult, R., Garcia, F.D., Balasch, J.: Gone in 360 seconds: Hijacking with hitag2. In: Proceedings of the 21st USENIX Conference on Security Symposium, p. 37. USENIX Association (2012)"},{"key":"17_CR21","doi-asserted-by":"publisher","first-page":"16314","DOI":"10.1109\/ACCESS.2017.2737957","volume":"5","author":"Z Wei","year":"2017","unstructured":"Wei, Z., Yanjiang, Y., Wu, Y., Weng, J., Deng, R.H.: HIBS-KSharing: hierarchical identity-based signature key sharing for automotive. IEEE Access 5, 16314\u201316323 (2017)","journal-title":"IEEE Access"},{"key":"17_CR22","unstructured":"Wetzels, J.: Broken keys to the kingdom: security and privacy aspects of RFID-based car keys. arXiv preprint \n                      arXiv:1405.7424\n                      \n                     (2014)"},{"key":"17_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-642-31912-9_20","volume-title":"Information Security and Cryptology - ICISC 2011","author":"M Wolf","year":"2012","unstructured":"Wolf, M., Gendrullis, T.: Design, implementation, and evaluation of a vehicular hardware security module. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 302\u2013318. Springer, Heidelberg (2012). \n                      https:\/\/doi.org\/10.1007\/978-3-642-31912-9_20"},{"key":"17_CR24","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/3-540-28428-1_13","volume-title":"Embedded Security in Cars","author":"M Wolf","year":"2006","unstructured":"Wolf, M., Weimerskirch, A., Paar, C.: Automotive digital rights management systems. In: Lemke, K., Paar, C., Wolf, M. (eds.) Embedded Security in Cars, pp. 221\u2013232. Springer, Heidelberg (2006). \n                      https:\/\/doi.org\/10.1007\/3-540-28428-1_13"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-26250-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,30]],"date-time":"2019-10-30T17:00:10Z","timestamp":1572454810000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-26250-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030262495","9783030262501"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-26250-1_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"9 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Turku","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Finland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"38","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conferences.ncl.ac.uk\/safecomp2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}