{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:53:49Z","timestamp":1725533629903},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642026164"},{"type":"electronic","value":"9783642026171"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02617-1_7","type":"book-chapter","created":{"date-parts":[[2009,6,17]],"date-time":"2009-06-17T10:22:04Z","timestamp":1245234124000},"page":"60-69","source":"Crossref","is-referenced-by-count":12,"title":["Tagging the Turtle: Local Attestation for Kiosk Computing"],"prefix":"10.1007","author":[{"given":"Ronald","family":"Toegl","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"McCune, J.M., Perrig, A., Seshadri, A., van Doorn, L.: Turtles all the way down: Research challenges in user-based attestation. In: Proceedings of HotSec. USENIX Association (2007)","DOI":"10.1145\/1413901.1413903"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1145\/1378600.1378623","volume-title":"MobiSys","author":"S. Garriss","year":"2008","unstructured":"Garriss, S., C\u00e1ceres, R., Berger, S., Sailer, R., van Doorn, L., Zhang, X.: Trustworthy and personalized computing on public kiosks. In: MobiSys, pp. 199\u2013210. ACM Press, New York (2008)"},{"key":"7_CR3","unstructured":"Parno, B.: Bootstrapping trust in a \u201dtrusted\u201d platform. In: Proc. of HotSec. USENIX (2008)"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/978-3-642-00587-9_7","volume-title":"Trust 2009","author":"M. Pirker","year":"2009","unstructured":"Pirker, M., Toegl, R., Hein, D., Danner, P.: A PrivacyCA for anonymity and trust. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol.\u00a05471, pp. 101\u2013119. Springer, Heidelberg (2009)"},{"key":"7_CR5","unstructured":"Iso\/iec 18092:2004 \u2013 near field communication \u2013 interface and protocol (nfcip-1). International Organization for Standardization (2007)"},{"key":"7_CR6","unstructured":"ECMA: ECMA-340: Near Field Communication \u2014 Interface and Protocol (NFCIP-1). European Association for Standardizing Information and Communication Systems (2004)"},{"key":"7_CR7","unstructured":"ECMA: ECMA-352: Near Field Communication Interface and Protocol-2 (NFCIP-2). European Association for Standardizing Information and Communication Systems (2003)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_1","volume-title":"Information and Communications Security","author":"G. Coker","year":"2008","unstructured":"Coker, G., Guttman, J., Loscocco, P., Sheehy, J., Sniffen, B.: Attestation: Evidence and trust. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol.\u00a05308. Springer, Heidelberg (2008)"},{"key":"7_CR9","unstructured":"Trusted Computing Group: TCG TPM specification version 1.2 revision 103 (2007)"},{"key":"7_CR10","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a tcg-based integrity measurement architecture. In: Proc. of Security 2004. USENIX (2004)"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-68979-9_1","volume-title":"Trusted Computing - Challenges and Applications","author":"P. England","year":"2008","unstructured":"England, P.: Practical techniques for operating system attestation. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol.\u00a04968, pp. 1\u201313. Springer, Heidelberg (2008)"},{"key":"7_CR12","volume-title":"NSPW","author":"A.R. Sadeghi","year":"2004","unstructured":"Sadeghi, A.R., St\u00fcble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: Hempelmann, C., Raskin, V. (eds.) NSPW. ACM Press, New York (2004)"},{"key":"7_CR13","volume-title":"Proccedings of STC","author":"L. Chen","year":"2006","unstructured":"Chen, L., Landfermann, R., L\u00f6hr, H., Rohe, M., Sadeghi, A.R., St\u00fcble, C.: A protocol for property-based attestation. In: Proccedings of STC. ACM Press, New York (2006)"},{"key":"7_CR14","volume-title":"Proccedings of STC","author":"U. K\u00fchn","year":"2007","unstructured":"K\u00fchn, U., Selhorst, M., St\u00fcble, C.: Realizing property-based attestation and sealing with commonly available hard- and software. In: Proccedings of STC. ACM Press, New York (2007)"},{"key":"7_CR15","unstructured":"Kauer, B.: Oslo: improving the security of trusted computing. In: Proceedings of 16th USENIX Security Symposium, pp. 1\u20139. USENIX Association (2007)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Computer Systems Architecture","author":"A. Oprea","year":"2004","unstructured":"Oprea, A., Balfanz, D., Durfee, G., Smetters, D.K.: Securing a remote terminal application with a mobile trusted device. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004. LNCS, vol.\u00a03189. Springer, Heidelberg (2004)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Sharp, R., Scott, J., Beresford, A.: Secure mobile computing via public terminals (2006)","DOI":"10.1007\/11748625_15"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"McCune, J., Perrig, A., Reiter, M.: Seeing-is-believing: using camera phones for human-verifiable authentication. In: 2005 IEEE Symposium on Security and Privacy (2005)","DOI":"10.1109\/SP.2005.19"},{"key":"7_CR19","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/1067170.1067179","volume-title":"Proc. of MobiSys","author":"R. C\u00e1ceres","year":"2005","unstructured":"C\u00e1ceres, R., Carter, C., Narayanaswami, C., Raghunath, M.: Reincarnating PCs with portable soulpads. In: Proc. of MobiSys, pp. 65\u201378. ACM Press, New York (2005)"},{"key":"7_CR20","unstructured":"Lindner, F.: Toying with barcodes. In: 24th Chaos Communication Congress (2007)"},{"key":"7_CR21","unstructured":"Haselsteiner, E., Breitfuss, K.: Security in near field communication (nfc). In: Workshop on RFID Security (2006)"},{"key":"7_CR22","unstructured":"Hancke, G.: A practical relay attack on iso 14443 proximity cards. Technical report, University of Cambridge (2005)"},{"key":"7_CR23","unstructured":"Tu, Y.J., Piramuthu, S.: Rfid distance bounding protocols. In: First International EURASIP Workshop on RFID Technology (2007)"},{"key":"7_CR24","first-page":"204","volume-title":"Proceedings of ASIACCS 2007","author":"J. Reid","year":"2007","unstructured":"Reid, J., Nieto, J.M.G., Tang, T., Senadji, B.: Detecting relay attacks with timing-based protocols. In: Proceedings of ASIACCS 2007, Singapore, pp. 204\u2013213. ACM Press, New York (2007)"},{"key":"7_CR25","first-page":"1227","volume-title":"Wirel. Commmun. Mob. Comput. 2008","author":"J. Munilla","year":"2008","unstructured":"Munilla, J., Peinado, A.: Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. In: Wirel. Commmun. Mob. Comput. 2008, vol.\u00a08, pp. 1227\u20131232. Wiley Interscience, Hoboken (2008)"},{"key":"7_CR26","volume-title":"Proceedings of TrustCom 2008","author":"R. Toegl","year":"2008","unstructured":"Toegl, R., Leung, A., Hofferek, G., Greimel, K., Phan, R., Bloem, R.: Formal analysis of a TPM-based secrets distribution and storage scheme. In: Proceedings of TrustCom 2008. IEEE Computer Society Press, Los Alamitos (2008)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Security and Assurance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02617-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T19:36:26Z","timestamp":1558380986000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02617-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642026164","9783642026171"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02617-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}