{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:12:47Z","timestamp":1725891167553},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540857341"},{"type":"electronic","value":"9783540857358"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85735-8_3","type":"book-chapter","created":{"date-parts":[[2008,8,22]],"date-time":"2008-08-22T08:47:03Z","timestamp":1219394823000},"page":"18-27","source":"Crossref","is-referenced-by-count":2,"title":["Implementation of a TCG-Based Trusted Computing in Mobile Device"],"prefix":"10.1007","author":[{"given":"SuGil","family":"Choi","sequence":"first","affiliation":[]},{"given":"JinHee","family":"Han","sequence":"additional","affiliation":[]},{"given":"JeongWoo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"JongPil","family":"Kim","sequence":"additional","affiliation":[]},{"given":"SungIk","family":"Jun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Trusted Computing Group: TCG Specification Architecture Overview. Specification Revision 1.4 (August 2, 2007), \n                    \n                      http:\/\/www.trustedcomputinggroup.org"},{"key":"3_CR2","unstructured":"Trusted Computing Group: TCG Mobile Reference Architecture. Specification version 1.0. Revision 1 (June 12, 2007), \n                    \n                      http:\/\/www.trustedcomputinggroup.org"},{"key":"3_CR3","unstructured":"Trusted Computing Group: TCG Mobile Trusted Module Specification. Specification version 1.0. Revision 1, June 12 (2007), \n                    \n                      http:\/\/www.trustedcomputinggroup.org"},{"key":"3_CR4","unstructured":"Trusted Computing Group: TCG Software Stack. Specification version 1.2, March 7 (2007), \n                    \n                      http:\/\/www.trustedcomputinggroup.org"},{"key":"3_CR5","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: 13th Usenix Security Symposium (August 2004)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Pearson, S.: How trusted computers can enhance privacy preserving mobile applications. In: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (June 2005)","DOI":"10.1109\/WOWMOM.2005.52"},{"key":"3_CR7","unstructured":"Apvrille, A., Gordon, D., Hallyn, S., Pourzandi, M., Roy, V.: DigSig: Run-time Authentication of Binaries at Kernel Level. In: 18th Large Installation System Administration Conference, November 14 (2004)"},{"key":"3_CR8","unstructured":"van Doorn, L., Ballintijn, G.: Signed Executables for Linux. Tech. Rep. CS-TR-4259, University of Maryland, College Park, June 4 (2001)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Loscocco, P.A., Wilson, P.W., Pendergrass, J.A., McDonell, C.D.: Linux kernel integrity measurement using contextual inspection. In: ACM workshop on Scalable trusted computing, November 2 (2007)","DOI":"10.1145\/1314354.1314362"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In: ACM Symposium on Operating Systems Principles, October 14-17 (2007)","DOI":"10.1145\/1294261.1294294"},{"key":"3_CR11","unstructured":"L4-embedded, \n                    \n                      http:\/\/www.ertos.nicta.com.au\/research\/l4\/"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85735-8_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:47:57Z","timestamp":1619509677000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85735-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540857341","9783540857358"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85735-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}