{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T11:40:24Z","timestamp":1740224424387,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255840"},{"type":"electronic","value":"9783540319795"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31979-5_31","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T16:42:55Z","timestamp":1277916175000},"page":"362-373","source":"Crossref","is-referenced-by-count":0,"title":["Protecting Mass Data Basing on Small Trusted Agent"],"prefix":"10.1007","author":[{"given":"Fangyong","family":"Hou","sequence":"first","affiliation":[]},{"given":"Zhiying","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: Protocols for public key cryptography. In: IEEE Symposium on Security and Privacy, Oakland, California, pp. 122\u2013134 (1980)","DOI":"10.1109\/SP.1980.10006"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Blum, M., Evans, W.S., Gemmell, P., Kannan, S., Naor, M.: Checking the correctness of memories. In: IEEE Symposium on Foundations of Computer Science, San Juan, Puerto Rico, pp. 90\u201399 (1991)","DOI":"10.1109\/SFCS.1991.185352"},{"key":"31_CR3","unstructured":"Gassend, B., Suh, G.E., Clarke, D., van Dijk, M., Devadas, S.: Caches and merkle trees for efficient memory authentication. In: Ninth International Symposium on High Performance Computer Architecture, Anaheim, California, pp. 8\u201312 (2003)"},{"key":"31_CR4","unstructured":"Suh, G.E., Clarke, D., Gassend, B., van Dijk, M., Devadas, S.: Hardware Mechanisms for Memory Integrity Checking. MIT Laboratory for Computer Science, MIT LCS TR, 872 (2003)"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Blaze, M.: A cryptographic file system for unix. In: 1st ACM Conference on Communications and Computing Security, pp. 9\u201316 (1993)","DOI":"10.1145\/168588.168590"},{"key":"31_CR6","unstructured":"Tripwire, http:\/\/www.tripwire.org"},{"key":"31_CR7","unstructured":"Fu, K., Kaashoek, F., Mazieres, D.: Fast and secure distributed read-only file system. In: Proceedings of OSDI 2000 (2000)"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Mazieres, D., Shasha, D.: Don\u2019t trust your file server. In: Proceedings of the 8th Workshop on Hot Topics in Operating Systems (2001)","DOI":"10.1109\/HOTOS.2001.990070"},{"key":"31_CR9","unstructured":"Maheshwari, U., Vingralek, R., Shapiro, W.: How to Build a Trusted Database System on Untrusted Storage. In: Proceedings of OSDI 2000 (2000)"},{"key":"31_CR10","unstructured":"Stein, C.A., Howard, J.H., Seltzer, M.I.: Unifying file system protection. In: 2001 USENIX Annual Technical Conference, pp. 79\u201390 (2001)"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Tomonori, F., Masanori, O.: Protecting the Integrity of an Entire File System. In: First IEEE International Workshop on Information Assurance, pp. 95\u2013105 (2003)","DOI":"10.1109\/IWIAS.2003.1192462"},{"key":"31_CR12","unstructured":"SHA-2 Standard. National Institute of Standards and Technology (NIST), Secure Hash Standard, FIPS PUB 180-2, http:\/\/csrc.nist.gov\/publications\/fips\/fips180-2\/fips180-2.pdf"},{"key":"31_CR13","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"R.J. Anderson","year":"2001","unstructured":"Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley and Sons, Chichester (2001)"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Hou, F., Wang, Z., Tang, Y., Liu, Z.: Protecting Integrity and Confidentiality for Data Communication. In: Ninth IEEE Symposium on Computers and Communications, Alexandria, Egypt, pp. 357\u2013362 (2004)","DOI":"10.1109\/ISCC.2004.1358430"},{"key":"31_CR15","unstructured":"Wang, X., Feng, D., Lai, X., Yu, H.: Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31979-5_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T11:01:42Z","timestamp":1740222102000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31979-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255840","9783540319795"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31979-5_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}