{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:17:37Z","timestamp":1725887857941},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319504988"},{"type":"electronic","value":"9783319505008"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-50500-8_18","type":"book-chapter","created":{"date-parts":[[2017,5,18]],"date-time":"2017-05-18T07:14:46Z","timestamp":1495091686000},"page":"497-519","source":"Crossref","is-referenced-by-count":1,"title":["Trusted Execution Environment and Host Card Emulation"],"prefix":"10.1007","author":[{"given":"Assad","family":"Umar","sequence":"first","affiliation":[]},{"given":"Keith","family":"Mayes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,19]]},"reference":[{"key":"18_CR1","unstructured":"Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, James Newsome, and Jonathan\u00a0M. McCune. Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings, chapter Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?, pages 159\u2013178. Springer Berlin Heidelberg, Berlin, Heidelberg, 2012. Cited 06 Jan 2016."},{"key":"18_CR2","unstructured":"EMV Payment Tokenisation Specification. Standard, 2014. Cited 15 Jan 2016."},{"key":"18_CR3","unstructured":"ARM Limited. ARM Security Technology Building a Secure System using TrustZone Technology, April 2009. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.prd29-genc-009492c\/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf . Cited 08 Feb 2016."},{"key":"18_CR4","unstructured":"Trusted\u00a0Computing Group. TCG Specification TPM 2.0 Mobile Reference Architecture, December 2014. http:\/\/www.trustedcomputinggroup.org\/wp-content\/uploads\/TPM-2-0-Mobile-Reference-Architecture-v2-r142-Specification_FINAL2.pdf . Cited 17 Feb 2016."},{"key":"18_CR5","unstructured":"Trusted\u00a0Computing Group. TCG Specification TPM 2.0 Mobile Common Profile, December 2015. http:\/\/www.trustedcomputinggroup.org\/wp-content\/uploads\/TPM_2.0_Mobile_Common_Profile_v2r31.pdf . Cited 19 Feb 2016."},{"key":"18_CR6","unstructured":"Trusted\u00a0Computing Group. TCG Specification TPM 2.0 Mobile Command Response Buffer Interface, December 2014. http:\/\/www.trustedcomputinggroup.org\/wp-content\/uploads\/Mobile-Command-Response-Buffer-Interface-v2-r12-Specification_FINAL2.pdf . Cited 19 Feb 2016."},{"key":"18_CR7","unstructured":"Unified Extensible Firmware\u00a0Interface Forum. Unified Extensible Firmware Interface Specification\u2013version 2.6, January 2016. http:\/\/www.uefi.org\/sites\/default\/files\/resources\/UEFIUEFI%20Spec%202_6.pdf . Cited 02 Jan 2016."},{"key":"18_CR8","unstructured":"GlobalPlatform. GlobalPlatform Device Technology, TEE System Architecture v1.0, December 2011. Cited 06 Mar 2016."},{"key":"18_CR9","unstructured":"GlobalPlatform. GlobalPlatform Device Technology, TEE Client API Specification v1.0, July 2010. Cited 06 Mar 2016."},{"key":"18_CR10","unstructured":"GlobalPlatform. GlobalPlatform Device Technology, TEE Internal API Specification, December 2011. Cited 10 Mar 2016."},{"key":"18_CR11","unstructured":"GlobalPlatform. GlobalPlatform Device Technology, Trusted User Interface API Specification v1.0, June 2013. Cited 12 Mar 2016."},{"key":"18_CR12","unstructured":"Intel Corporation. Intel Software Guard Extensions Programming Reference, October 2014. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf . Cited 18 Mar 2016."},{"key":"18_CR13","unstructured":"Smart\u00a0Card Alliance. Host Card Emulation (HCE) 101. Technical report, Smart Card Alliance, Mobile and NFC Council, August 2014. Cited 20 Mar 2016."},{"key":"18_CR14","unstructured":"Doug Yeager. Added NFC Reader support for two new tag types: ISO PCD type A and ISO PCD type B, 2012. https:\/\/github.com\/CyanogenMod\/android_packages_apps_Nfc . Cited 06 Apr 2016."},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Assad Umar, Keith Mayes, and Konstantinos Markantonakis. Performance variation in host-based card emulation compared to a hardware security element. In First Conference on Mobile and Secure Services (MOBISECSERV), pages 1\u20136, 2015. Cited 11 Apr 2016.","DOI":"10.1109\/MOBISECSERV.2015.7072872"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Stanley Chow, Phil Eisen, Harold Johnson, and Paul\u00a0C. van Oorschot. Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002. Revised Papers, chapter A White-Box DES Implementation for DRM Applications, pages 1\u201315. Springer Berlin Heidelberg, Berlin, Heidelberg, 2003. Cited 16 Apr 2016.","DOI":"10.1007\/978-3-540-44993-5_1"},{"key":"18_CR17","unstructured":"Brecht Wyseur. White-box cryptography: Hiding keys in software. Technical report, NAGRA Kudelski Group, Switzerland, 2012. Cited 06 Apr 2016."},{"key":"18_CR18","unstructured":"Android\u00a0Developer Guide. Service. https:\/\/developer.android.com\/reference\/android\/app\/Service.html#WhatIsAService . Cited 16 Apr 2016."},{"key":"18_CR19","unstructured":"Identification cards \u2013 Integrated circuit cards \u2013 Part 4: Organization, security and commands for interchange. Standard, International Organization for Standardization, Geneva, CH, 2013. Cited 06 Jun 2016."},{"key":"18_CR20","unstructured":"Android\u00a0Developer Guide. Host-based card emulation. https:\/\/developer.android.com\/guide\/topics\/connectivity\/nfc\/hce.html . 16 Apr 2016"}],"container-title":["Smart Cards, Tokens, Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50500-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T16:17:18Z","timestamp":1569341838000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50500-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319504988","9783319505008"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50500-8_18","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}