{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:11:15Z","timestamp":1764173475626},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540689782"},{"type":"electronic","value":"9783540689799"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68979-9_3","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T12:02:26Z","timestamp":1218542546000},"page":"33-47","source":"Crossref","is-referenced-by-count":30,"title":["A Software-Based Trusted Platform Module Emulator"],"prefix":"10.1007","author":[{"given":"Mario","family":"Strasser","sequence":"first","affiliation":[]},{"given":"Heiko","family":"Stamer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Aaraj, N., Raghunathan, A., Ravi, S., Jha, N.K.: Energy and Execution Time Analysis of a Software-Based Trusted Platform Module. In: Proceedings of the Conference on Design, Automation and Test in Europe (DATE 2007), pp. 1128\u20131133 (2007)","DOI":"10.1109\/DATE.2007.364446"},{"key":"3_CR2","unstructured":"Anderson, M.J., Moffie, M., Dalton, C.I.: Towards Trustworthy Virtualisation Environments: Xen Library OS Security Service Infrastructure. Technical Report HPL-2007-69, HP Laboratories Bristol (April 2007)"},{"key":"3_CR3","unstructured":"Matt Bishop. Computer Security: Art and Science. Addison Wesley, Reading (2003)"},{"key":"3_CR4","unstructured":"Granlund, T., et al.: GNU Multiple Precision Arithmetic Library."},{"key":"3_CR5","unstructured":"Challener, D., et al.: A Practical Guide to Trusted Computing. IBM Press (2007)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Mitchell, C., et al.: Trusted Computing. IET (2005)","DOI":"10.1049\/PBPC006E"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.-R., Selhorst, M., St\u00fcble, C., Wachsmann, C., Winandy, M.: TCG inside? A Note on TPM Specification Compliance. In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing (STC 2006), pp. 47\u201356 (2006)","DOI":"10.1145\/1179474.1179487"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Sarmenta, L.F.G., van Dijk, M., O\u2019Donnell, C.W., Rhodes, J., Devadas, S.: Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing (STC 2006), pp. 27\u201342 (2006)","DOI":"10.1145\/1179474.1179485"},{"key":"3_CR9","unstructured":"Strasser, M., et al.: Software-based TPM Emulator, \n                    \n                      http:\/\/tpm-emulator.berlios.de\/"},{"key":"3_CR10","unstructured":"Trusted Computing Group. Architecture Overview"},{"key":"3_CR11","unstructured":"Trusted Computing Group. TPM Software Stack (TSS) Specification, Version 1.2, \n                    \n                      https:\/\/www.trustedcomputinggroup.org\/specs\/TSS\/"},{"key":"3_CR12","unstructured":"Trusted Computing Group. TPM Specification, Version 1.2, Revision 103, \n                    \n                      https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\n                    \n                    \n                  ."},{"key":"3_CR13","unstructured":"TU Graz, IAIK. jTSS \u2013 Java TCG Software Stack, \n                    \n                      http:\/\/trustedjava.sourceforge.net\/"},{"key":"3_CR14","unstructured":"Yoder, K., et al.: TrouSerS \u2013 Open-source TCG Software Stack, \n                    \n                      http:\/\/trousers.sourceforge.net\/"},{"key":"3_CR15","unstructured":"Zimmermann, R.: IBM Direct Anonymous Attestation Tools \u2013 TPM Test Suite, \n                    \n                      http:\/\/www.zurich.ibm.com\/security\/daa\/"}],"container-title":["Lecture Notes in Computer Science","Trusted Computing - Challenges and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68979-9_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:21:25Z","timestamp":1620015685000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68979-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540689782","9783540689799"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68979-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}