{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T04:17:19Z","timestamp":1749010639617,"version":"3.41.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319395548"},{"type":"electronic","value":"9783319395555"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39555-5_3","type":"book-chapter","created":{"date-parts":[[2016,6,8]],"date-time":"2016-06-08T14:11:31Z","timestamp":1465395091000},"page":"36-57","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token"],"prefix":"10.1007","author":[{"given":"Ian","family":"Goldberg","sequence":"first","affiliation":[]},{"given":"Graeme","family":"Jenkinson","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Stajano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,9]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"FIDO Alliance: FIDO UAF complete specifications FINAL 1.0, December 2014","DOI":"10.53841\/bpsfu.2014.1.114.74"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-25867-1_6","volume-title":"Security Protocols XIX","author":"F Stajano","year":"2011","unstructured":"Stajano, F.: Pico: no more passwords!. In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols XIX. LNCS, vol. 7114, pp. 49\u201381. Springer, Heidelberg (2011)"},{"key":"3_CR3","unstructured":"Desmedt, Y., Burmester, M., Safavi-Naini, R., Wang, H.: Threshold Things That Think (T4): Security requirements to cope with theft of handheld\/handless internet devices. In: Proceedings of Symposium on Requirements Engineering for Information Security (2001)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Corner, M.D., Noble, B.D.: Zero-interaction authentication. In: Proceedings of ACM MobiCom 2002, pp. 1\u201311, 23\u201328 September 2002","DOI":"10.1145\/570645.570647"},{"issue":"5","key":"3_CR5","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/1506409.1506429","volume":"52","author":"JA Halderman","year":"2009","unstructured":"Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: Cold-boot attacks on encryption keys. Commun. ACM 52(5), 91\u201398 (2009)","journal-title":"Commun. ACM"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Stafford-Fraser, Q., Stajano, F., Warrington, C., Jenkinson, G., Spencer, M., Payne, J.: To have and have not: Variations on secret sharing to model user presence. In: Proceedings of UPSIDE workshop of UBICOMP 2014, September 2014","DOI":"10.1145\/2638728.2641705"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-319-26096-9_21","volume-title":"Security Protocols XXIII","author":"F Stajano","year":"2015","unstructured":"Stajano, F., Christianson, B., Lomas, M., Jenkinson, G., Payne, J., Spencer, M., Stafford-Fraser, Q.: Pico without public keys. In: Christianson, B., \u0160venda, P., Maty\u00e1\u0161, V., Malcolm, J., Stajano, F., Anderson, J. (eds.) Security Protocols 2015. LNCS, vol. 9379, pp. 195\u2013211. Springer, Heidelberg (2015). doi:10.1007\/978-3-319-26096-9_21"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-642-35694-0_24","volume-title":"Security Protocols XX","author":"O Stannard","year":"2012","unstructured":"Stannard, O., Stajano, F.: Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J. (eds.) Security Protocols 2012. LNCS, vol. 7622, pp. 223\u2013230. Springer, Heidelberg (2012)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Hancke, G.P., Kuhn, M.G.: An RFID distance bounding protocol. In: Proceedings of IEEE SECURECOMM 2005, pp. 67\u201373. IEEE Computer Society, Washington, DC (2005)","DOI":"10.1109\/SECURECOMM.2005.56"},{"issue":"11","key":"3_CR10","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/3-540-44750-4_27","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"A Herzberg","year":"1995","unstructured":"Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: how to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339\u2013352. Springer, Heidelberg (1995)"},{"key":"3_CR12","unstructured":"Krause, F.M.A.: Designing Secure & Usable Picosiblings: An exploration of potential pairing mechanisms. Master\u2019s thesis, Wolfson College, University of Cambridge (2014)"},{"key":"3_CR13","unstructured":"M\u00fcller, T., Freiling, F.C., Dewald, A.: TRESOR runs encryption securely outside RAM. In: 20th USENIX Security Symposium, USENIX (2011)"},{"issue":"9","key":"3_CR14","doi-asserted-by":"publisher","first-page":"11734","DOI":"10.3390\/s120911734","volume":"12","author":"C Gomez","year":"2012","unstructured":"Gomez, C., Oller, J., Paradells, J.: Overview and evaluation of bluetooth low energy: an emerging low-power wireless technology. Sensors 12(9), 11734\u201311753 (2012)","journal-title":"Sensors"},{"key":"3_CR15","unstructured":"MacKenzie, C.M., Laskey, K., McCabe, F., Brown, P.F., Metz, R., Hamilton, B.A.: Reference model for service oriented architecture 1.0. OASIS Standard (2006)"},{"key":"3_CR16","unstructured":"Ryan, M.: Bluetooth: with low energy comes low security. In: 7th USENIX Workshop on Offensive Technologies, Berkeley, CA, USENIX (2013)"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/978-3-319-12400-1_17","volume-title":"Security Protocols XXII","author":"F Stajano","year":"2014","unstructured":"Stajano, F., Jenkinson, G., Payne, J., Spencer, M., Stafford-Fraser, Q., Warrington, C.: Bootstrapping adoption of the pico password replacement system. In: Christianson, B., Malcolm, J., Maty\u00e1\u0161, V., \u0160venda, P., Stajano, F., Anderson, J. (eds.) Security Protocols 2014. LNCS, vol. 8809, pp. 172\u2013186. Springer, Heidelberg (2014)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP 2012, pp. 553\u2013567. IEEE Computer Society, Washington, DC (2012)","DOI":"10.1109\/SP.2012.44"},{"key":"3_CR19","unstructured":"Kamath, S., Lindh, J.: Measuring Bluetooth Low Energy Power Consumption. Texas Instruments application note AN092, Dallas (2010)"},{"key":"3_CR20","volume-title":"Bluetooth Low Energy The Developer\u2019s Handbook","author":"R Heydon","year":"2013","unstructured":"Heydon, R.: Bluetooth Low Energy The Developer\u2019s Handbook. Prentice Hall, Upper Saddle River (2013)"},{"key":"3_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1007\/978-3-319-07308-8_23","volume-title":"Cross-Cultural Design","author":"MA Sasse","year":"2014","unstructured":"Sasse, M.A., Steves, M., Krol, K., Chisnell, D.: The great authentication fatigue \u2013 and how to overcome it. In: Rau, P.L.P. (ed.) CCD 2014. LNCS, vol. 8528, pp. 228\u2013239. Springer, Heidelberg (2014)"},{"issue":"7","key":"3_CR22","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1145\/358886.358895","volume":"23","author":"SK Card","year":"1980","unstructured":"Card, S.K., Moran, T.P., Newell, A.: The keystroke-level model for user performance time with interactive systems. Commun. ACM 23(7), 396\u2013410 (1980)","journal-title":"Commun. ACM"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Laurie, B., Singer, A.: Choose the red pill and the blue pill: A position paper. In: Proceedings of the 2008 Workshop on New Security Paradigms, NSPW 2008, pp. 127\u2013133. ACM, New York (2008)","DOI":"10.1145\/1595676.1595695"},{"key":"3_CR24","unstructured":"Alliance, F.: FIDO U2F Spec Package, May 2015"},{"issue":"1","key":"3_CR25","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/128756.128759","volume":"10","author":"R Want","year":"1992","unstructured":"Want, R., Hopper, A., Falcao, V., Gibbons, J.: The active badge location system. ACM Trans. Inf. Syst. 10(1), 91\u2013102 (1992)","journal-title":"ACM Trans. Inf. Syst."},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Landwehr, C.E.: Protecting unattended computers without software. In: Proceedings of the 13th Annual Computer Security Applications Conference, pp. 274\u2013283. IEEE Computer Society, Washington, DC (1997)","DOI":"10.1109\/CSAC.1997.646200"},{"key":"3_CR27","unstructured":"Landwehr, C.E., Latham, D.L.: Secure identification system US Patent 5,892,901, filed 1997\u201306-10, granted 1999\u201304-06 (1999)"},{"key":"3_CR28","unstructured":"Peeters, R.: Security architecture for things that think. Ph.D. thesis, KU Leuven (2012)"},{"key":"3_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-642-17455-1_8","volume-title":"Pairing-Based Cryptography - Pairing 2010","author":"K Simoens","year":"2010","unstructured":"Simoens, K., Peeters, R., Preneel, B.: Increased resilience in threshold cryptography: sharing a secret with devices that cannot store shares. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol. 6487, pp. 116\u2013135. Springer, Heidelberg (2010)"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Cachin, C., Kursawe, K., Lysyanskaya, A., Strobl, R.: Asynchronous verifiable secret sharing and proactive cryptosystems. In: 9th ACM Conference on Computer and Communications Security, pp. 88\u201397 (2002)","DOI":"10.1145\/586110.586124"},{"key":"3_CR31","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1007\/11787006_25","volume-title":"Automata, Languages and Programming","author":"Tamir Tassa","year":"2006","unstructured":"Tassa, T., Dyn, N.: Multipartite Secret Sharing by Bivariate Interpolation. In: 33rd International Colloquium on Automata, Languages and Programming, pp. 288\u2013299 (2006)"},{"issue":"4","key":"3_CR32","doi-asserted-by":"publisher","first-page":"34:1","DOI":"10.1145\/1880022.1880028","volume":"13","author":"D Schultz","year":"2010","unstructured":"Schultz, D., Liskov, B., Liskov, M.: MPSS: Mobile proactive secret sharing. ACM Trans. Inf. Syst. Secur. 13(4), 34:1\u201334:32 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"3_CR33","unstructured":"Instruments, T.: CC2541 SimpleLink Bluetooth Smart and Proprietary Wireless MCU. Web page"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39555-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T21:03:23Z","timestamp":1748984603000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-39555-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319395548","9783319395555"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39555-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"9 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}