{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:48:15Z","timestamp":1743025695097,"version":"3.40.3"},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125732"},{"type":"electronic","value":"9783319125749"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12574-9_2","type":"book-chapter","created":{"date-parts":[[2014,11,21]],"date-time":"2014-11-21T13:38:31Z","timestamp":1416577111000},"page":"16-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Exploiting the Network for Securing Personal Devices"],"prefix":"10.1007","author":[{"given":"Chris","family":"Dalton","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Lioy","sequence":"additional","affiliation":[]},{"given":"Diego","family":"Lopez","sequence":"additional","affiliation":[]},{"given":"Fulvio","family":"Risso","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Sassu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,18]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Gasmi, Y., Sadeghi, A.R., Stewin, P., Unger, M., Ramunno, G., Vernizzi, D.: An efficient implementation of trusted channels based on OpenSSL. In: ACM Workshop on Scalable Trusted Computing, pp. 41\u201350 (2008)","DOI":"10.1145\/1456455.1456462"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Goldman, K., Perez, R., Sailer, R.: Linking remote attestation to secure tunnel endpoints. In: ACM Workshop on Scalable Trusted Computing, pp. 21\u201324 (2006)","DOI":"10.1145\/1179474.1179481"},{"issue":"5","key":"2_CR3","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1629607.1629610","volume":"39","author":"F Gringoli","year":"2009","unstructured":"Gringoli, F., Salgarelli, L., Dusi, M., Cascarano, N., Risso, F., Claffy, K.: GT: picking up the truth from the ground for Internet traffic. ACM SIGCOMM Comput. Commun. Rev. 39(5), 12\u201318 (2009)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"2_CR4","unstructured":"Trusted Computing Group: TPM Main Specification, Version 1.2, Revision 103 (2007). https:\/\/www.trustedcomputinggroup.org"},{"issue":"2","key":"2_CR5","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: Openflow: enabling innovation in campus networks. SIGCOMM Comput. Commun. Rev. 38(2), 69\u201374 (2008)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"2_CR6","unstructured":"Network Functions Virtualisation Industry Specification Group (NFV ISG): Network Functions Virtualisation - update white paper, October 2013. http:\/\/portal.etsi.org\/NFV\/NFV_White_Paper2.pdf"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Risso, F., Cerrato, I.: Customizing data-plane processing in edge routers. In: European Workshop on Software Defined Networks, pp. 114\u2013120 (2012)","DOI":"10.1109\/EWSDN.2012.14"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-642-14992-4_14","volume-title":"Financial Cryptography and Data Security","author":"A-R Sadeghi","year":"2010","unstructured":"Sadeghi, A.-R., Schulz, S.: Extending IPsec for efficient remote attestation. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb\u00e9, F. (eds.) FC 2010 Workshops. LNCS, vol. 6054, pp. 150\u2013165. Springer, Heidelberg (2010)"}],"container-title":["Communications in Computer and Information Science","Cyber Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12574-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T13:29:37Z","timestamp":1674826177000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12574-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125732","9783319125749"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12574-9_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}