{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:20:03Z","timestamp":1725852003220},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319315492"},{"type":"electronic","value":"9783319315508"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31550-8_11","type":"book-chapter","created":{"date-parts":[[2016,3,22]],"date-time":"2016-03-22T14:26:20Z","timestamp":1458656780000},"page":"169-182","source":"Crossref","is-referenced-by-count":0,"title":["Research on Trusted Bootstrap Based on the Universal Smart Card"],"prefix":"10.1007","author":[{"given":"Lin","family":"Yan","sequence":"first","affiliation":[]},{"given":"Jianbiao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,16]]},"reference":[{"key":"11_CR1","first-page":"139","volume":"2","author":"C Shen","year":"2010","unstructured":"Shen, C., et al.: Research and development of trusted computing. J. China Sci. 2, 139\u2013166 (2010)","journal-title":"J. China Sci."},{"key":"11_CR2","first-page":"11","volume":"6","author":"C Shen","year":"2014","unstructured":"Shen, C.: Thinking and revelation of cyber space security strategy. J. Fin. Computerizing 6, 11\u201313 (2014)","journal-title":"J. Fin. Computerizing"},{"key":"#cr-split#-11_CR3.1","unstructured":"TCG PC Client Specific Implementation Specification for Conventional BIOS Specification Version 1.21 Errata Revision 1.00 February 24th, 2012 For TPM Family 1.2"},{"key":"#cr-split#-11_CR3.2","unstructured":"Level 2, 4 (2014).   http:\/\/www.trustedcomputinggroup.org\/"},{"key":"11_CR4","unstructured":"UEFI. UEFI specification version 2.3.1 (2011). \n                      http:\/\/www.uefi.org\/specs"},{"key":"11_CR5","volume-title":"Trusted Computing","author":"Z Huanguo","year":"2011","unstructured":"Huanguo, Z., Zhao, B., et al.: Trusted Computing. Wuhan University Press, Wuhan (2011)"},{"key":"11_CR6","first-page":"22","volume":"5","author":"H Zhibin","year":"2012","unstructured":"Zhibin, H.: The theoretical construction and realization path of state cyberspace security strategy in China. J. China Soft. Sci. 5, 22\u201327 (2012)","journal-title":"J. China Soft. Sci."},{"key":"11_CR7","unstructured":"The White House (Washington, USA). International Strategy for Cyberspace-Prosperity, Security, and Openness in a Networked World, 5 (2011). \n                      http:\/\/www.whitehouse.gov"},{"key":"11_CR8","unstructured":"Masti, R.J., Marforio, C., Capkun, S.: An architecture for concurrent execution of secure environments in clouds. In: Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop, pp. 11\u201322. ACM (2013)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Danev, B., Masti, R.J., Karame, G.O., et al.: Enabling secure VM-vTPM migration in private clouds. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp. 187\u2013196. ACM (2011)","DOI":"10.1145\/2076732.2076759"},{"key":"11_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05253-8_11","volume-title":"Research of Trust Chain of Operating System","author":"H-J Li","year":"2009","unstructured":"Li, H.-J., Tian, X.-X.: Research of Trust Chain of Operating System. Springer, Heidelberg (2009)"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1109\/TPDS.2011.282","volume":"23","author":"W-N Cong","year":"2012","unstructured":"Cong, W.-N., Cao, K.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Distrib. Syst. 23, 1467\u20131479 (2012)","journal-title":"IEEE Trans. Distrib. Syst."},{"key":"11_CR12","unstructured":"Trusted Computing Group. [EB\/OL], 4 (2014). \n                      http:\/\/www.trustedcomputinggroup.org\/"},{"key":"11_CR13","volume-title":"Trusted Computing and Trust Management","author":"J Tian","year":"2014","unstructured":"Tian, J., et al.: Trusted Computing and Trust Management. Science Press, Beijing (2014)"},{"issue":"4","key":"11_CR14","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MNET.2010.5510914","volume":"24","author":"C Wang","year":"2010","unstructured":"Wang, C., Ren, K., Lou, W., et al.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19\u201324 (2010)","journal-title":"IEEE Netw."},{"issue":"6","key":"11_CR15","doi-asserted-by":"publisher","first-page":"227","DOI":"10.14257\/ijsh.2013.7.6.22","volume":"7","author":"M-S Seo","year":"2013","unstructured":"Seo, M.-S., Park, D.-W.: Security measures of personal information of smart home PC. Int. J. Smart Home 7(6), 227\u2013236 (2013)","journal-title":"Int. J. Smart Home"},{"key":"11_CR16","first-page":"1409","volume":"10","author":"L Wu","year":"2012","unstructured":"Wu, L., Li, H., Ren, Y., et al.: Smart card power analysis platform design and implementation. J. Tsinghua Univ. (Sci. Technol.) 10, 1409\u20131414 (2012)","journal-title":"J. Tsinghua Univ. (Sci. Technol.)"},{"key":"11_CR17","unstructured":"Cui, J.: Research of Multi-factors Identity Authentication Protocol and Implementation Based on Smart Card. J. East China Normal University 9 (2013)"},{"key":"11_CR18","unstructured":"Wang, M.: Research and Design for the Low Power Dual Interface CPU Smart Card Chip. J. Fudan University (2011)"},{"key":"11_CR19","unstructured":"Huang, Y.: Researches on Authentication Protocols and Applications in Network Security Systems. Wuhan University, 4 (2010)"},{"key":"11_CR20","volume-title":"Principle and Application of Trusted Computing Technology","author":"D Zou","year":"2011","unstructured":"Zou, D., et al.: Principle and Application of Trusted Computing Technology. Science Press, Beijing (2011)"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31550-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T21:03:51Z","timestamp":1559423031000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31550-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319315492","9783319315508"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31550-8_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}