{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:22Z","timestamp":1725558982950},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255215"},{"type":"electronic","value":"9783540320043"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-32004-3_16","type":"book-chapter","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T21:15:56Z","timestamp":1278882956000},"page":"151-162","source":"Crossref","is-referenced-by-count":3,"title":["Look Who\u2019s Talking \u2013 Authenticating Service Access Points"],"prefix":"10.1007","author":[{"given":"Adolf","family":"Hohl","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lutz","family":"Lowis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alf","family":"Zugenmaier","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"3","key":"16_CR1","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M. Weiser","year":"1991","unstructured":"Weiser, M.: The Computer of the 21st Century (1991). Scientific American\u00a0265(3), 66\u201375 (1991)","journal-title":"Scientific American"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45427-6_23","volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"M. Langheinrich","year":"2001","unstructured":"Langheinrich, M.: Privacy by Design \u2013 Principles of Privacy-Aware Ubiquitous Systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol.\u00a02201, pp. 273\u2013291. Springer, Heidelberg (2001)"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-39881-3_12","volume-title":"Security in Pervasive Computing","author":"S. Creese","year":"2004","unstructured":"Creese, S., Goldsmith, M., Roscoe, B., Zakiuddin, I.: Authentication for pervasive computing. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 116\u2013129. Springer, Heidelberg (2004)"},{"key":"16_CR4","unstructured":"Trusted Computing Group: TCG Backgrounder (2003), https:\/\/www.trustedcomputinggroup.org\/downloads\/TCG_Backgrounder.pdf"},{"key":"16_CR5","unstructured":"IBM Corporation: Developer\u2019s view of IBM PowerPC Reference Platform (2003), http:\/\/www-306.ibm.com\/chips\/products\/powerpc\/newsletter\/mar2003\/ppc_process_at_work.html"},{"key":"16_CR6","unstructured":"Kinney, S.: Embedded Security Seminar: The Trusted Platform Module Specification and Integrating the Trusted Platform Module into Embedded Systems (2004), http:\/\/www.cmpevents.com\/ESCe04\/a.asp?option=G&V=3&id=271270"},{"key":"16_CR7","unstructured":"Hohl, A., Zugenmaier, A.: Safeguarding Personal Data with DRM in Pervasive Computing. In: Proceedings of the Security and Privacy Workshop of the Pervasive 2004 Conference, Vienna (2004)"},{"key":"16_CR8","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: 13th Usenix Security Symposium, San Diego 2004 (2004)"},{"key":"16_CR9","unstructured":"Haldar, V., Chandra, D., Franz, M.: Semantic Remote Attestation - A Virtual Machine Directed Approach to Trusted Computing. In: USENIX (ed.) Proceedings 3rd Virtual Machine Research and Technology Symposium VM 2004, San Jose, Berkeley, CA, USA, pp. 29\u201341. USENIX (2004)"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Dierks, T., Allen, C.: RFC 2246: The TLS Protocol Version 1.0 (1999), http:\/\/www.ietf.org\/rfc\/rfc2246.txt","DOI":"10.17487\/rfc2246"},{"key":"16_CR11","unstructured":"Campadello, S., MacLaverty, T.S.R.: Security and Reliability Challenges in Component-Based Software for Consumer Devices. In: The IASTED International Conference on Software Engineering, 2004, Innsbruck, Austria (2004), http:\/\/www.nokia.com\/library\/files\/docs\/CamMacSar.pdf"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Lie, D., Thekkath, C.A., Horowitz, M.: Implementing an Untrusted Operating System on Trusted Hardware. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP). (2003), http:\/\/www.eecg.toronto.edu\/~lie\/papers\/lie-sosp2003.pdf","DOI":"10.1145\/945445.945463"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Necula, G.C., Lee, P.: Safe Kernel Extensions Without Run-Time Checking. In: USENIX (ed.) 2nd Symposium on Operating Systems Design and Implementation (OSDI 1996), Seattle, WA, Berkeley, CA, USA, October 28\u201331, pp. 229\u2013243. USENIX (1996)","DOI":"10.1145\/238721.238781"},{"key":"16_CR14","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1145\/363516.363526","volume":"9","author":"A.C. Myers","year":"2000","unstructured":"Myers, A.C., Liskov, B.: Protecting Privacy using the Decentralized Label Model. ACM Transactions on Software Engineering and Methodology\u00a09, 410\u2013442 (2000)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"16_CR15","unstructured":"IBM Corporation: Global Security Analysis Lab: TCPA Resources (2003) http:\/\/www.research.ibm.com\/gsal\/tcpa\/"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Riordan, J., Stueble, C., Waidner, M., Weber, A.: Die PERSEUS Systemarchitektur (2001), http:\/\/www-krypt.cs.uni-sb.de\/download\/papers\/PfRSWW2001a.pdf","DOI":"10.1007\/978-3-663-05918-9_1"},{"key":"16_CR17","unstructured":"Wash, R.: TCPA support on NetBSD (2004) http:\/\/www.citi.umich.edu\/u\/rwash\/projects\/trusted\/netbsd.html"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-32004-3_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:33:52Z","timestamp":1605760432000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-32004-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255215","9783540320043"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-32004-3_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}