{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:04:44Z","timestamp":1725516284535},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540689782"},{"type":"electronic","value":"9783540689799"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68979-9_14","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T12:02:26Z","timestamp":1218542546000},"page":"179-190","source":"Crossref","is-referenced-by-count":10,"title":["On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA)"],"prefix":"10.1007","author":[{"given":"Adrian","family":"Leung","sequence":"first","affiliation":[]},{"given":"Liqun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chris J.","family":"Mitchell","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1145\/1030083.1030103","volume-title":"Proceedings of the 11th ACM Conference on Computer and Communications Security","author":"E. Brickell","year":"2004","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington DC, USA, October 25\u201329, 2004, pp. 132\u2013145. ACM Press, New York (2004)"},{"volume-title":"Trusted Computing","year":"2005","key":"14_CR2","unstructured":"Mitchell, C.J. (ed.): Trusted Computing. IEE Press, London (2005)"},{"key":"14_CR3","unstructured":"Trusted Computing Group (TCG): TCG Specification Architecture Overview. Version 1.2, The Trusted Computing Group, Portland, Oregon, USA (2004)"},{"key":"14_CR4","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-0-387-72367-9_38","volume-title":"22nd IFIP TC-11 International Information Security Conference (SEC 2007) on New Approaches for Security, Privacy and Trust in Complex Environments","author":"C. Rudolph","year":"2007","unstructured":"Rudolph, C.: Covert identity information in direct anonymous attestation (DAA). In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) 22nd IFIP TC-11 International Information Security Conference (SEC 2007) on New Approaches for Security, Privacy and Trust in Complex Environments, Sandton, South Africa, May 14-16, 2007. IFIP International Federation for Information Processing, vol.\u00a0232, pp. 443\u2013448. Springer, Boston (2007)"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/P2P.2005.40","volume-title":"Proceedings of the Fifth International Conference on Peer-to-Peer Computing (P2P 2005)","author":"S. Balfe","year":"2005","unstructured":"Balfe, S., Lakhani, A.D., Paterson, K.G.: Trusted computing: Providing security for peer-to-peer networks. In: Proceedings of the Fifth International Conference on Peer-to-Peer Computing (P2P 2005), Konstanz, Germany, August 31\u2013September 2, 2005, pp. 117\u2013124. IEEE Computer Society, Los Alamitos (2005)"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-74853-3_5","volume-title":"UbiComp 2007: Ubiquitous Computing","author":"A. Leung","year":"2007","unstructured":"Leung, A., Mitchell, C.J.: Ninja: Non identity based, privacy preserving authentication for ubiquitous environments. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol.\u00a04717, pp. 73\u201390. Springer, Heidelberg (2007)"},{"key":"14_CR7","unstructured":"Leung, A., Poh, G.S.: An anonymous watermarking scheme for content distribution protection using trusted computing. In: Proceedings of the International Conference on Security and Cryptography (SECRYPT 2007), Barcelona, Spain, August 28\u201331, 2007, pp. 319\u2013326. INSTICC Press (2007)"}],"container-title":["Lecture Notes in Computer Science","Trusted Computing - Challenges and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68979-9_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:21:24Z","timestamp":1620015684000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68979-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540689782","9783540689799"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68979-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}