{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:40:05Z","timestamp":1725518405643},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540858928"},{"type":"electronic","value":"9783540858935"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85893-5_10","type":"book-chapter","created":{"date-parts":[[2008,8,29]],"date-time":"2008-08-29T06:28:18Z","timestamp":1219991298000},"page":"133-148","source":"Crossref","is-referenced-by-count":23,"title":["The Trusted Execution Module: Commodity General-Purpose Trusted Computing"],"prefix":"10.1007","author":[{"given":"Victor","family":"Costan","sequence":"first","affiliation":[]},{"given":"Luis F. G.","family":"Sarmenta","sequence":"additional","affiliation":[]},{"given":"Marten","family":"van Dijk","sequence":"additional","affiliation":[]},{"given":"Srinivas","family":"Devadas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Costan, V.: A commodity trusted computing module. Master\u2019s thesis, Massachusetts Institute of Technology (2008), http:\/\/tem.rubyforge.org"},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1147\/rd.483.0475","volume":"48","author":"T. Arnold","year":"2004","unstructured":"Arnold, T., Van Doorn, L.: The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer. IBM Journal of Research and Development\u00a048, 475\u2013487 (2004)","journal-title":"IBM Journal of Research and Development"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Suh, G., Clarke, D., Gassend, B., van Dijk, M., Devadas, S.: AEGIS: architecture for tamper-evident and tamper-resistant processing. In: Proceedings of the 17th annual international conference on Supercomputing, pp. 160\u2013171 (2003)","DOI":"10.1145\/782814.782838"},{"key":"10_CR4","unstructured":"Hendry, M.: Smart Card Security and Applications. Artech House (2001)"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/S1389-1286(01)00167-0","volume":"36","author":"D. Husemann","year":"2001","unstructured":"Husemann, D.: Standards in the smart card world. Computer Networks\u00a036, 473\u2013487 (2001)","journal-title":"Computer Networks"},{"key":"10_CR6","unstructured":"Maosco, L.: (MultOS), http:\/\/www.multos.com\/ [cited May, 2008]"},{"key":"10_CR7","unstructured":"Sun\u00a0Microsystems, I.: Java Card Platform Specification 2.2.1 (2003), http:\/\/java.sun.com\/javacard\/specs.html [cited May, 2008]"},{"key":"10_CR8","unstructured":"Lawson, N.: TPM hardware attacks. root labs rdist (2007), http:\/\/rdist.root.org\/2007\/07\/16\/tpm-hardware-attacks\/ [cited May, 2008]"},{"key":"10_CR9","unstructured":"Lawson, N.: TPM hardware attacks (part 2). root labs rdist (2007), http:\/\/rdist.root.org\/2007\/07\/17\/tpm-hardware-attacks-part-2\/ [cited May, 2008]"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Sarmenta, L., van Dijk, M., O\u2019Donnell, C., Rhodes, J., Devadas, S.: Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. In: Proceedings of the first ACM workshop on Scalable trusted computing, pp. 27\u201342 (2006)","DOI":"10.1145\/1179474.1179485"},{"key":"10_CR11","unstructured":"Group, T.C.: Trusted platform module main (2007), https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/ [cited May, 2008]"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Housley, R., Polk, W., Ford, W., Solo, D.: Internet X. 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile (2002)","DOI":"10.17487\/rfc3280"},{"key":"10_CR13","volume-title":"Java Virtual Machine Specification","author":"T. Lindholm","year":"1999","unstructured":"Lindholm, T., Yellin, F.: Java Virtual Machine Specification. Addison-Wesley Longman Publishing Co., Inc, Boston (1999)"},{"key":"10_CR14","unstructured":"Sussman, G.J.: Guy Lewis\u00a0Steele, J.: Scheme: An interpreter for extended lambda calculus. Technical Report AI Lab Memo AIM-349, MIT AI Lab (1975)"},{"key":"10_CR15","unstructured":"Guy Lewis\u00a0Steele, J.: Lambda: The ultimate declarative. Technical Report AI Lab Memo AIM-379, MIT AI Lab (1976)"},{"key":"10_CR16","unstructured":"Guy Lewis Steele, J., Sussman, G.J.: Lambda: The ultimate imperative. Technical Report AI Lab Memo AIM-353, MIT AI Lab (1976)"},{"key":"10_CR17","unstructured":"for Standardizing\u00a0Information, E.A., Systems, C.: 262: ECMAScript Language Specification. ECMA, Geneva, Switzerland, third edition (1999), http:\/\/www.ecma-international.org\/publications\/files\/ECMA-ST\/Ecma-262.pdf"},{"key":"10_CR18","volume-title":"Object oriented programming: an evolutionary approach","author":"B. Cox","year":"1986","unstructured":"Cox, B.: Object oriented programming: an evolutionary approach. Addison-Wesley Longman Publishing Co., Inc., Boston (1986)"},{"key":"10_CR19","unstructured":"Guy Lewis\u00a0Steele, J.: Rabbit: A compiler for scheme. Master\u2019s thesis, MIT AI Lab (1978)"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Eastlake, D., Jones, P.: RFC 3174: US Secure Hash Algorithm 1 (SHA1). Internet RFCs (2001)","DOI":"10.17487\/rfc3174"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Leach, P., Mealling, M., Salz, R.: RFC 4122: A Universally Unique IDentifier (UUID) URN Namespace (2005)","DOI":"10.17487\/rfc4122"},{"key":"10_CR22","unstructured":"Freier, A., Karlton, P., Kocher, P.: Secure Socket Layer 3.0. IETF draft (1996)"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Sasada, K.: YARV: yet another RubyVM: innovating the ruby interpreter. In: Conference on OOP Systems Languages and Applications, pp. 158\u2013159 (2005)","DOI":"10.1145\/1094855.1094912"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 122\u2013133 (1980)","DOI":"10.1109\/SP.1980.10006"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 148\u2013160 (2002)","DOI":"10.1145\/586110.586132"},{"key":"10_CR26","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MS.2007.135","volume":"24","author":"J. Cuadrado","year":"2007","unstructured":"Cuadrado, J., Molina, J.: Building Domain-Specific Languages for Model-Driven Development. Software, IEEE\u00a024, 48\u201355 (2007)","journal-title":"Software, IEEE"},{"key":"10_CR27","first-page":"145","volume":"22","author":"H. Cunningham","year":"2007","unstructured":"Cunningham, H.: Reflexive metaprogramming in Ruby: tutorial presentation. Journal of Computing Sciences in Colleges\u00a022, 145\u2013146 (2007)","journal-title":"Journal of Computing Sciences in Colleges"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85893-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T17:38:32Z","timestamp":1557769112000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85893-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540858928","9783540858935"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85893-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}