{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T17:23:00Z","timestamp":1768411380839,"version":"3.49.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031081460","type":"print"},{"value":"9783031081477","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-08147-7_9","type":"book-chapter","created":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T16:43:08Z","timestamp":1655224988000},"page":"130-145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["HistoTrust: Ethereum-Based Attestation of\u00a0a\u00a0Data History Built with\u00a0OP-TEE and\u00a0TPM"],"prefix":"10.1007","author":[{"given":"Dylan","family":"Paulin","sequence":"first","affiliation":[]},{"given":"Christine","family":"Hennebert","sequence":"additional","affiliation":[]},{"given":"Thibault","family":"Franco-Rondisson","sequence":"additional","affiliation":[]},{"given":"Romain","family":"Jayles","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Loubier","sequence":"additional","affiliation":[]},{"given":"Rapha\u00ebl","family":"Collado","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,15]]},"reference":[{"key":"9_CR1","unstructured":"Trusted Computing Group: TCG Trusted Attestation Protocol (TAP) Use Cases for TPM Families 1.2 and 2.0 and DICE, Version 1.0, Revision 0.35, November 2019. https:\/\/trustedcomputinggroup.org\/wp-content\/uploads\/TCG_TNC_TAP_Use_Cases_v1r0p35_published.pdf"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10207-011-0124-7","volume":"10","author":"G Coker","year":"2011","unstructured":"Coker, G., et al.: Principles of remote attestation. Int. J. Inf. Secur. 10, 63\u201381 (2011). https:\/\/doi.org\/10.1007\/s10207-011-0124-7","journal-title":"Int. J. Inf. Secur."},{"key":"9_CR3","unstructured":"Yang, K., Chen, L., Zhang, Z., Newton, C.J.P., Yang, B., Xi, L.: Direct Anonymous Attestation with Optimal TPM Signing Efficiency, eprint 1128 (2018). https:\/\/eprint.iacr.org\/2018\/1128.pdf"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-319-93524-9_5","volume-title":"Information Security Theory and Practice","author":"C Shepherd","year":"2018","unstructured":"Shepherd, C., Akram, R.N., Markantonakis, K.: EmLog: tamper-resistant system logging for constrained devices with TEEs. In: Hancke, G.P., Damiani, E. (eds.) WISTP 2017. LNCS, vol. 10741, pp. 75\u201392. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93524-9_5"},{"key":"9_CR5","doi-asserted-by":"publisher","unstructured":"Saroiu, S., Wolman, A.: I am a sensor, and I approve this message. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, HotMobile 2010. ACM Publisher (2010). https:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.155.242&rep=rep1&type=pdf. https:\/\/doi.org\/10.1145\/1734583.1734593","DOI":"10.1145\/1734583.1734593"},{"key":"9_CR6","unstructured":"Hardjono, T., Smith, N.: An attestation architecture for Blockchain networks, arXiv:2005.04293 [cs.CR] (2020). http:\/\/export.arxiv.org\/abs\/2005.04293"},{"key":"9_CR7","doi-asserted-by":"publisher","unstructured":"Hennebert, C., Barrois, F.: Is the blockchain a relevant technology for the industry 4.0? In: Proceedings of the 2nd IEEE Conference on Blockchain Research & Applications for Innovative Networks and Services, BRAINS 2020, pp. 212\u2013216. IEEE Publisher (2020). https:\/\/ieeexplore.ieee.org\/document\/9223290. https:\/\/doi.org\/10.1109\/BRAINS49436.2020.9223290","DOI":"10.1109\/BRAINS49436.2020.9223290"},{"key":"9_CR8","unstructured":"Schneier, B., Kelsey, J.: Cryptographic support for secure logs on untrusted machines. In: Proceedings of the 7th Conference on USENIX Security Symposium, vol. 7, SSYM 1998. USENIX Association (1998)"},{"key":"9_CR9","doi-asserted-by":"publisher","unstructured":"Karande, V., Bauman, E., Lin, Z., Khan, L.: SGX-log: securing system logs with SGX. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS 2017, pp. 19\u201330. ACM Publisher (2017). https:\/\/doi.org\/10.1145\/3052973.3053034","DOI":"10.1145\/3052973.3053034"},{"key":"9_CR10","unstructured":"Chakraborty, D., Hanzlik, L., Bugiel, S.: simTPM: user-centric TPM for mobile devices. In: Proceedings of the 28th Conference USENIX Security Symposium, SSYM 2019, pp. 533\u2013550. USENIX Association (2019). https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/chakraborty. ISBN 978-1-939133-06-9"},{"key":"9_CR11","doi-asserted-by":"publisher","unstructured":"Shepherd, C., et al.: Secure and trusted execution: past, present, and future - a critical review in the context of the internet of things and cyber-physical systems. In: Proceedings of the IEEE Trustcom\/BigDataSE\/ISPA, pp. 168\u2013177. IEEE Publisher (2016). https:\/\/eprint.iacr.org\/2016\/454.pdf. https:\/\/doi.org\/10.1109\/TrustCom.2016.0060","DOI":"10.1109\/TrustCom.2016.0060"},{"key":"9_CR12","doi-asserted-by":"publisher","unstructured":"Shekhtman, L., Waisbard, E.: EngraveChain: tamper-proof distributed log system. In: Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor, BlockSys 2019. ACM Publisher (2019). https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3362744.3363346. https:\/\/doi.org\/10.1145\/3362744.3363346","DOI":"10.1145\/3362744.3363346"},{"key":"9_CR13","doi-asserted-by":"publisher","unstructured":"Javaid, U., Aman, M.N., Sikdar, B.: BlockPro: blockchain based data provenance and integrity for secure IoT environments. In: The 1st Workshop on Blockchain-enabled Networked Sensor Systems, BlockSys 2018. ACM Publisher (2018). https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3282278.3282281. https:\/\/doi.org\/10.1145\/3282278.3282281","DOI":"10.1145\/3282278.3282281"},{"key":"9_CR14","doi-asserted-by":"publisher","unstructured":"Elsts, A., Mitskas, E., Oikonomou, G.: Distributed ledger technology and the internet of things: a feasibility study. In: The 1st Workshop on Blockchain-enabled Networked Sensor Systems, BlockSys 2018. ACM Publisher (2018). https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3282278.3282280. https:\/\/doi.org\/10.1145\/3282278.3282280","DOI":"10.1145\/3282278.3282280"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Hengartner, U.: Location privacy based on trusted computing and secure logging. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm 2008. ACM Publisher (2008). https:\/\/core.ac.uk\/download\/pdf\/21748895.pdf. https:\/\/doi.org\/10.1.1.216.7307","DOI":"10.1145\/1460877.1460898"},{"key":"9_CR16","doi-asserted-by":"publisher","unstructured":"Koutroumpouchos, N., et al.: Secure edge computing with lightweight control-flow property-based attestation. In: Proceedings of the IEEE Conference on Network Softwarization, NetSoft 2019, pp. 84\u201392. IEEE Publisher (2019). https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&arnumber=8806658. https:\/\/doi.org\/10.1109\/NETSOFT.2019.8806658","DOI":"10.1109\/NETSOFT.2019.8806658"},{"key":"9_CR17","doi-asserted-by":"publisher","unstructured":"Casado-Vara, R., de la Prieta, F., Prieto, J., Corchado, J.M.: Blockchain framework for IoT data quality via edge computing. In: Proceedings of the 1st Workshop on Blockchain-Enabled Networked Sensor Systems, BlockSys 2018, pp. 19\u201324. ACM Publisher (2018). https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3282278.3282282. https:\/\/doi.org\/10.1145\/3282278.3282282","DOI":"10.1145\/3282278.3282282"},{"key":"9_CR18","doi-asserted-by":"publisher","unstructured":"Sabt, M., Achemlal, M., Bouabdallah, A.: Trusted execution environment: what it is, and what it is not. In: Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrusteCom 2015. IEEE Publisher (2015). https:\/\/hal.archives-ouvertes.fr\/hal-01246364\/document. https:\/\/doi.org\/10.1109\/Trustcom.2015.357","DOI":"10.1109\/Trustcom.2015.357"},{"key":"9_CR19","doi-asserted-by":"publisher","unstructured":"Gentilal, M., Martins, P., Sousa, L.: TrustZone-backed bitcoin wallet. In: Proceedings of the 4th Workshop on Cryptography and Security in Computing Systems, CS2 2017, pp. 25\u201328. ACM Publisher (2017). https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3031836.3031841. https:\/\/doi.org\/10.1145\/3031836.3031841","DOI":"10.1145\/3031836.3031841"},{"key":"9_CR20","unstructured":"Szil\u00e1gyi, P.: EIP-225: Clique proof-of-authority consensus protocol. Ethereum Improvement Proposal. https:\/\/eips.ethereum.org\/EIPS\/eip-225"},{"key":"9_CR21","unstructured":"STMicroelectronics: STM32MP15ROM code secure boot. https:\/\/wiki.st.com\/stm32mpu\/wiki\/STM32MP15_ROM_code_secure_boot"},{"key":"9_CR22","doi-asserted-by":"publisher","unstructured":"Stucchi, D., Susella, R., Fragneto, P., Rossi, B.: Secure and effective implementation of an IOTA light node using STM32. In: The Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor, BlockSys 2019. ACM Publiher (2019). https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3362744.3363344. https:\/\/doi.org\/10.1145\/3362744.3363344","DOI":"10.1145\/3362744.3363344"},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-642-21969-6_23","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2011","author":"J Buchmann","year":"2011","unstructured":"Buchmann, J., Dahmen, E., Ereth, S., H\u00fclsing, A., R\u00fcckert, M.: On the security of the winternitz one-time signature scheme. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 363\u2013378. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21969-6_23"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-08147-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T16:43:45Z","timestamp":1655225025000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-08147-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031081460","9783031081477"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-08147-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"15 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Foundations and Practice of Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fps2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.fps-2021.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}