{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T19:09:07Z","timestamp":1761764947355},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540735465"},{"type":"electronic","value":"9783540735472"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73547-2_15","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T14:54:52Z","timestamp":1186844092000},"page":"123-134","source":"Crossref","is-referenced-by-count":5,"title":["Final Fantasy \u2013 Securing On-Line Gaming with Trusted Computing"],"prefix":"10.1007","author":[{"given":"Shane","family":"Balfe","sequence":"first","affiliation":[]},{"given":"Anish","family":"Mohammed","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","volume-title":"Exploiting Online Games: How to Break Multi-user Computer Games","author":"G. Hoglund","year":"2007","unstructured":"Hoglund, G., McGraw, G.: Exploiting Online Games: How to Break Multi-user Computer Games. Addison-Wesley, London (2007)"},{"key":"15_CR2","unstructured":"Sony Computer Entertainment Inc: DNAS (Dynamic Network Authentication System) (2003), http:\/\/www.us.playstation.com\/DNAS"},{"key":"15_CR3","unstructured":"BBC News: Virtual property market booming (2005), http:\/\/news.bbc.co.uk\/1\/hi\/technology\/4421496.stm"},{"key":"15_CR4","unstructured":"Trusted Computing Group: TCG Trusted Network Connect TNC Architecture for Interoperability. 1.1 revision, 6 edn. (2006)"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1103599.1103606","volume-title":"NetGames 2005: Proceedings of 4th ACM SIGCOMM workshop on Network and system support for games","author":"J. Yan","year":"2005","unstructured":"Yan, J., Randell, B.: A systematic classification of cheating in online games. In: NetGames 2005: Proceedings of 4th ACM SIGCOMM workshop on Network and system support for games, pp. 1\u20139. ACM Press, New York (2005)"},{"key":"15_CR6","unstructured":"Intel Corporation: LaGrande Technology Architectural Overview (2003)"},{"key":"15_CR7","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.istr.2005.05.006","volume":"10","author":"G. Strongin","year":"2005","unstructured":"Strongin, G.: Trusted computing using AMD Pacifica and Presidio secure virtual machine technology. Information Security Technical Report\u00a010, 120\u2013132 (2005)","journal-title":"Information Security Technical Report"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Formal Techniques for Networked and Distributed Systems \u2013 FORTE 2004","author":"M. Abadi","year":"2004","unstructured":"Abadi, M., Wobber, T.: A logical account of NGSCB. In: de Frutos-Escrig, D., N\u00fa\u00f1ez, M. (eds.) FORTE 2004. LNCS, vol.\u00a03235, pp. 1\u201312. Springer, Heidelberg (2004)"},{"key":"15_CR9","unstructured":"Lemos, R.: World of warcraft hackers using Sony BMG rootkit (2005), http:\/\/www.securityfocus.com\/news\/10232"},{"key":"15_CR10","unstructured":"Trusted Computing Group: TPM Main: Part 1 Design Principles. 1.2 revision, 93 edn. (2006)"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","first-page":"86","volume-title":"E-Commerce and Web Technologies","author":"M. Peinado","year":"2003","unstructured":"Peinado, M., Chen, Y., England, P., Manferdelli, J.: NGSCB: A trusted open system. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds.) E-Commerce and Web Technologies. LNCS, vol.\u00a02738, pp. 86\u201397. Springer, Heidelberg (2003)"},{"volume-title":"Trusted Computing","year":"2005","key":"15_CR12","unstructured":"Mitchell, C. (ed.): Trusted Computing. IEE Press, New York (2005)"},{"volume-title":"Trusted Computing Platforms: TCPA Technology in Context","year":"2002","key":"15_CR13","unstructured":"Pearson, S. (ed.): Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall PTR, Englewood Cliffs (2002)"},{"key":"15_CR14","unstructured":"Trusted Computing Group: TPM Main: Part 3 Commands. 1.2 revision, 93 edn. (2006)"},{"key":"15_CR15","unstructured":"Group, T.C.: TCG Software Stack Specificiation Version 1.2 Level 1 (2006)"},{"key":"15_CR16","doi-asserted-by":"crossref","DOI":"10.1515\/9780691186290","volume-title":"Auctions: Theory and Practice (The Toulouse Lectures in Economics)","author":"P. Klemperer","year":"2004","unstructured":"Klemperer, P.: Auctions: Theory and Practice (The Toulouse Lectures in Economics). Princeton University Press, Princeton (2004)"},{"key":"15_CR17","unstructured":"Ivanova-Stenzel, R., Salmon, T.C.: Revenue equivalence revisited. In: Discussion Papers 175, SFB\/TR 15 Governance and the Efficiency of Economic Systems. Free University of Berlin, Humboldt University of Berlin, University of Bonn, University (2006)"},{"key":"15_CR18","unstructured":"Omote, K.: A Study on Electronic Auctions. PhD thesis, Japan Advanced Institute of Science and Technology (2002)"},{"key":"15_CR19","unstructured":"Trusted Computing Group \u2014 TCG Infrastructure Workgroup: Subject Key Attestation Evidence Extension. V1.0 revision, 7 th edn. (2005)"},{"key":"15_CR20","unstructured":"Group, T.C.: TPM Main: Part 2 Structures of the TPM. 1.2 revision, 93 rd edn. (2006)"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73547-2_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:15:49Z","timestamp":1605762949000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73547-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540735465","9783540735472"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73547-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}