{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:04:49Z","timestamp":1725516289544},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540689782"},{"type":"electronic","value":"9783540689799"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68979-9_5","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T08:02:26Z","timestamp":1218528146000},"page":"60-74","source":"Crossref","is-referenced-by-count":22,"title":["Embedded Trusted Computing with Authenticated Non-volatile Memory"],"prefix":"10.1007","author":[{"given":"Dries","family":"Schellekens","sequence":"first","affiliation":[]},{"given":"Pim","family":"Tuyls","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Ekberg, J.E., Kyl\u00e4np\u00e4\u00e4, M.: Mobile Trusted Module (MTM) - an introduction (November 2007), \n                    \n                      http:\/\/research.nokia.com\/files\/NRCTR2007015.pdf"},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1314354.1314358","volume-title":"2nd ACM workshop on Scalable Trusted Computing \u2013 STC 2007","author":"K. Dietrich","year":"2007","unstructured":"Dietrich, K.: An Integrated Architecture for Trusted Computing for Java enabled Embedded Devices. In: 2nd ACM workshop on Scalable Trusted Computing \u2013 STC 2007, pp. 2\u20136. ACM, New York (2007)"},{"issue":"6","key":"5_CR3","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/MDT.2007.196","volume":"24","author":"P. Wilson","year":"2007","unstructured":"Wilson, P., Frey, A., Mihm, T., Kershaw, D., Alves, T.: Implementing Embedded Security on Dual-Virtual-CPU Systems. IEEE Design and Test of Computers\u00a024(6), 582\u2013591 (2007)","journal-title":"IEEE Design and Test of Computers"},{"key":"5_CR4","unstructured":"Khan, M.H., Seifert, J.P., Wheeler, D.M., Brizek, J.P.: A Platform-level Trust-Architecture for Hand-held Devices. In: ECRYPT Workshop, CRASH \u2013 CRyptographic Advances in Secure Hardware, Leuven, Belgium, p. 16 (2005)"},{"key":"5_CR5","unstructured":"Berger, S., C\u00e1ceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doorn, L.: vTPM: Virtualizing the Trusted Platform Module. In: Proceedings of the 15th USENIX Security Symposium, Berkeley, CA, USA, p. 21. USENIX Association (2006)"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1314354.1314359","volume-title":"2nd ACM workshop on Scalable Trusted Computing \u2013 STC 2007","author":"X. Zhang","year":"2007","unstructured":"Zhang, X., Ac\u0131i\u00e7mez, O., Seifert, J.P.: A Trusted Mobile Phone Reference Architecture via Secure Kernel. In: 2nd ACM workshop on Scalable Trusted Computing \u2013 STC 2007, pp. 7\u201314. ACM, New York (2007)"},{"key":"5_CR7","unstructured":"Kasper, M.: Virtualisation of a SIM-Card using Trusted Computing. Master\u2019s thesis, Private Fernfachhochschule Darmstadt (2007)"},{"key":"5_CR8","unstructured":"Kursawe, K., Schellekens, D., Preneel, B.: Analyzing trusted platform communication. In: ECRYPT Workshop, CRASH \u2013 CRyptographic Advances in Secure Hardware, Leuven, Belgium, p. 8 (2005)"},{"key":"5_CR9","unstructured":"De Vries, A., Ma, Y.: A logical approach to NVM integration in SOC design. EDN Magazine\u00a0(2) (January 2007), \n                    \n                      http:\/\/www.impinj.com\/pdf\/EDN_NVMinSoC.pdf"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1314354.1314360","volume-title":"2nd ACM workshop on Scalable Trusted Computing \u2013 STC 2007","author":"T. Eisenbarth","year":"2007","unstructured":"Eisenbarth, T., G\u00fcneysu, T., Paar, C., Sadeghi, A.R., Schellekens, D., Wolf, M.: Reconfigurable Trusted Computing in Hardware. In: 2nd ACM workshop on Scalable Trusted Computing \u2013 STC 2007, pp. 15\u201320. ACM, New York (2007)"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/1179474.1179487","volume-title":"1st ACM workshop on Scalable Trusted Computing \u2013 STC 2006","author":"A.R. Sadeghi","year":"2006","unstructured":"Sadeghi, A.R., Selhorst, M., St\u00fcble, C., Wachsmann, C., Winandy, M.: TCG inside? A Note on TPM Specification Compliance. In: 1st ACM workshop on Scalable Trusted Computing \u2013 STC 2006, pp. 47\u201356. ACM, New York (2006)"},{"key":"5_CR12","unstructured":"Alves, T., Rudelic, J.: ARM Security Solutions and Intel Authenticated Flash (2007), \n                    \n                      http:\/\/www.arm.com\/pdfs\/Intel_ARM_Security_WhitePaper.pdf"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J. Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 63\u201380. Springer, Heidelberg (2007)"},{"key":"5_CR14","unstructured":"Drimer, S.: Volatile FPGA design security \u2013 a survey (December 2007), \n                    \n                      http:\/\/www.cl.cam.ac.uk\/~sd410\/papers\/fpga_security.pdf"},{"key":"5_CR15","unstructured":"Baetoniu, C., Sheth, S.: FPGA IFF Copy Protection Using Dallas Semiconductor\/Maxim DS2432 Secure EEPROMs (August 2005), \n                    \n                      http:\/\/www.xilinx.com\/support\/documentation\/application_notes\/xapp780.pdf"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1145\/586110.586132","volume-title":"ACM Conference on Computer and Communications Security \u2013 CCS 2002","author":"B. Gassend","year":"2002","unstructured":"Gassend, B., Clarke, D.E., van Dijk, M., Devadas, S.: Silicon Physical Unknown Functions. In: Atluri, V. (ed.) ACM Conference on Computer and Communications Security \u2013 CCS 2002, pp. 148\u2013160. ACM, New York (2002)"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/3-540-44887-X_47","volume-title":"Audio-and Video-Based Biometrie Person Authentication","author":"J.P.M.G. Linnartz","year":"2003","unstructured":"Linnartz, J.P.M.G., Tuyls, P.: New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol.\u00a02688, pp. 393\u2013402. Springer, Heidelberg (2003)"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 523\u2013540. Springer, Heidelberg (2004)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Clarke, D.E., Gassend, B., van Dijk, M., Devadas, S.: Efficient Memory Integrity Verification and Encryption for Secure Processors. In: 36th Annual International Symposium on Microarchitecture, pp. 339\u2013350. ACM\/IEEE (2003)","DOI":"10.1109\/MICRO.2003.1253207"},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/FDTC.2007.9","volume-title":"4th International Workshop on Fault Diagnosis and Tolerance in Cryptography \u2013 FDTC 2007","author":"H. Handschuh","year":"2007","unstructured":"Handschuh, H., Trichina, E.: Securing Flash Technology. In: Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.P. (eds.) 4th International Workshop on Fault Diagnosis and Tolerance in Cryptography \u2013 FDTC 2007, pp. 3\u201317. IEEE Computer Society, Los Alamitos (2007)"}],"container-title":["Lecture Notes in Computer Science","Trusted Computing - Challenges and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68979-9_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:21:26Z","timestamp":1620001286000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68979-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540689782","9783540689799"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68979-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}