{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T02:08:08Z","timestamp":1771726088208,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319312705","type":"print"},{"value":"9783319312712","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31271-2_4","type":"book-chapter","created":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T13:33:58Z","timestamp":1457530438000},"page":"57-74","source":"Crossref","is-referenced-by-count":2,"title":["seTPM: Towards Flexible Trusted Computing on Mobile Devices Based on GlobalPlatform Secure Elements"],"prefix":"10.1007","author":[{"given":"Sergej","family":"Proskurin","sequence":"first","affiliation":[]},{"given":"Michael","family":"Wei\u00df","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Sigl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,10]]},"reference":[{"key":"4_CR1","unstructured":"Trusted Computing Group: TCG specification architecture overview specification, Revision 1.4, August 2007"},{"key":"4_CR2","volume-title":"A Practical Guide to Trusted Computing","author":"D Challener","year":"2007","unstructured":"Challener, D., Yoder, K., Catherman, R., Safford, D., Van Doorn, L.: A Practical Guide to Trusted Computing. Pearson Education, Indianapolis (2007)"},{"key":"4_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6584-9","volume-title":"A Practical Guide to TPM 2.0","author":"W Arthur","year":"2015","unstructured":"Arthur, W., Challener, D., Goldman, K.: A Practical Guide to TPM 2.0. Springer, Heidelberg (2015)"},{"key":"4_CR4","volume-title":"TEE System Architecture - Public Release v1.0","author":"GlobalPlatform Inc.","year":"2011","unstructured":"GlobalPlatform Inc.: TEE System Architecture - Public Release v1.0. GlobalPlatform Inc., California (2011)"},{"key":"4_CR5","unstructured":"ARM Security Technology - Building a Secure System using TrustZone Technology, Prd29-genc-009492c ed. ARM Limited, April 2009"},{"key":"4_CR6","unstructured":"Trusted Computing Group: TPM 2.0 Mobile Reference Architecture Family \u201c2.0\", Level 00 Revision 142, December 2014"},{"key":"4_CR7","unstructured":"Trusted Computing Group: TPM MOBILE with Trusted Execution Environment for Comprehensive Mobile Device Security (2012)"},{"key":"4_CR8","unstructured":"Trusted Computing Group: TCG Mobile Trusted Module Specification Version 1.0, Revision 6, June 2008"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-68979-9_3","volume-title":"Trusted Computing - Challenges and Applications","author":"M Strasser","year":"2008","unstructured":"Strasser, M., Stamer, H.: A software-based trusted platform module emulator. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 33\u201347. Springer, Heidelberg (2008)"},{"key":"4_CR10","unstructured":"Oracle: Java Card Platform Specification 2.2.2"},{"key":"4_CR11","unstructured":"Sailer, R., Zhang, X., Jaeger, T., Van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: USENIX Security Symposium, vol. 13, pp. 223\u2013238 (2004)"},{"key":"4_CR12","unstructured":"Trusted Computing Group: TPM Main Specification Level 2 Version 1.2, Revision 116, March 2011"},{"key":"4_CR13","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak specifications version 2 (2009)"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-540-85893-5_10","volume-title":"Smart Card Research and Advanced Applications","author":"V Costan","year":"2008","unstructured":"Costan, V., Sarmenta, L.F.G., van Dijk, M., Devadas, S.: The trusted execution module: commodity general-purpose trusted computing. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 133\u2013148. Springer, Heidelberg (2008)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, D., Han, Z., Yan, G.: A portable TPM based on USB key. In: Proceedings of the 17th ACM Conference on Computer, Communications Security, ser. CCS 2010, pp. 750\u2013752. ACM, New York (2010)","DOI":"10.1145\/1866307.1866419"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Akram, R., Markantonakis, K., Mayes, K.: Trusted platform module for smart cards. In: 2014 6th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20135, March 2014","DOI":"10.1109\/NTMS.2014.6814058"},{"key":"4_CR17","unstructured":"Berger, S., C\u00e1ceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doorn, L.: vtpm: virtualizing the trusted platform module. In: Proceedings of the 15th Conference on USENIX Security Symposium, ser. USENIX-SS 2006, vol. 15. USENIX Association, Berkeley (2006)"},{"key":"4_CR18","unstructured":"TrouSerS: The open-source TCG Software Stack"},{"key":"4_CR19","unstructured":"Trusted Computing Group: TSS System Level API and TPM Command Transmission Interface Specification Family \u201c2.0\", Level 00 Revision 01.00, January 2015"},{"key":"4_CR20","unstructured":"ISO, Identification cards - Integrated circuit cards - Part 4: Organization, security and commands for interchange, International Organization for Standardization, Geneva, Switzerland, ISO\/IEC 7816\u20134:2005. ISO (2005)"},{"key":"4_CR21","unstructured":"Trusted Computing Group: TPM Library Specification Family \u201c2.0\", Level 00, Revision 01.16 (2014)"},{"key":"4_CR22","unstructured":"Montgomery, M., Krishna, K.: Secure object sharing in java card. In: Proceedings of the USENIX Workshop on Smartcard Technology, ser. WOST 1999, p. 14. USENIXAssociation, Berkeley (1999)"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/11535218_2","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X Wang","year":"2005","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17\u201336. Springer, Heidelberg (2005)"},{"key":"4_CR24","unstructured":"SHA-3 standard: Permutation-based hash and extendable-outputfunctions, National Institute of Standards and Technology Std., Rev. DRAFT FIPS PUB 202, May 2014"},{"key":"4_CR25","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak, note on parameters and usage, February 2010"},{"key":"4_CR26","unstructured":"Trusted Computing Platform Alliance: TCPA Main Specification Version 1.1b, February 2002"},{"key":"4_CR27","unstructured":"Kauer, B.: Oslo: improving the security of trusted computing. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, ser. SS 2007, pp. 16: 1\u201316: 9. USENIX Association, Berkeley (2007)"},{"key":"4_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-29804-2_12","volume-title":"Public Key Infrastructures, Services and Applications","author":"J Winter","year":"2012","unstructured":"Winter, J., Dietrich, K.: A Hijacker\u2019s guide to the LPC bus. In: Petkova-Nikova, S., Pashalidis, A., Pernul, G. (eds.) EuroPKI 2011. LNCS, vol. 7163, pp. 176\u2013193. Springer, Heidelberg (2012)"},{"key":"4_CR29","unstructured":"ARM: Designing with TrustZone\n                      \n                        \n                      \n                      $$^{\\textregistered }$$\n                    - Hardware Requirements"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31271-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:03:00Z","timestamp":1559412180000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31271-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319312705","9783319312712"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31271-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}