{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:39:38Z","timestamp":1725899978375},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642138683"},{"type":"electronic","value":"9783642138690"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_7","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T07:24:20Z","timestamp":1277796260000},"page":"95-108","source":"Crossref","is-referenced-by-count":2,"title":["Application of Trusted Computing in Automation to Prevent Product Piracy"],"prefix":"10.1007","author":[{"given":"Nora","family":"Lieberknecht","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-540-78663-4_12","volume-title":"Trustworthy Global Computing","author":"K. Dietrich","year":"2008","unstructured":"Dietrich, K., Pirker, M., Vejda, T., Toegl, R., Winkler, T., Lipp, P.: A practical approach for establishing trust relationships between remote platforms using trusted computing. In: Barthe, G., Fournet, C. (eds.) TGC 2007 and FODO 2008. LNCS, vol.\u00a04912, pp. 156\u2013168. Springer, Heidelberg (2008)"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-642-00587-9_3","volume-title":"Trusted Computing","author":"K. Dietrich","year":"2009","unstructured":"Dietrich, K., Winter, J.: Implementation aspects of mobile and embedded trusted computing. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol.\u00a05471, pp. 29\u201344. Springer, Heidelberg (2009)"},{"key":"7_CR3","volume-title":"Trusted Platform Module Basics: Using TPM in Embedded Systems","author":"S. Kinney","year":"2006","unstructured":"Kinney, S.: Trusted Platform Module Basics: Using TPM in Embedded Systems. Elsevier, Burlington (2006)"},{"key":"7_CR4","unstructured":"Trusted Computing Group: TCG Glossary, http:\/\/www.trustedcomputinggroup.org\/developers\/glossary"},{"key":"7_CR5","unstructured":"RSA Laboratories: PKCS #1 v2.1: RSA Cryptography Standard, http:\/\/www.rsa.com\/rsalabs\/node.asp?id=2125"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-1-4020-9498-9_2","volume-title":"Reinventing Data Protection?","author":"A. Rouvroy","year":"2009","unstructured":"Rouvroy, A., Poullet, Y.: The Right to Informational Self-Determination and the Value of Self-Development: Reassessing the Importance of Privacy for Democracy. In: Gutwirth, S., Poullet, Y., de Hert, P., de Terwangne, C., Nouwt, S. (eds.) Reinventing Data Protection? pp. 45\u201376. Springer, Netherlands (2009)"},{"key":"7_CR7","unstructured":"Trusted Computing Group: TCG Software Stack (TSS) Specification Version 1.2 Level 1 Errata A Part1: Commands and Structures, http:\/\/www.trustedcomputinggroup.org\/files\/resource_files\/6479CD77-1D09-3519-AD89EAD1BC8C97F0\/TSS_1_2_Errata_A-final.pdf"},{"key":"7_CR8","unstructured":"IBM: TrouSerS - An open-source TCG software stack implementation, http:\/\/sourceforge.net\/projects\/trousers\/"},{"key":"7_CR9","unstructured":"Security Innovation: Core TCG Software Stack (CTSS), http:\/\/www.securityinnovation.com\/pdf\/collateral\/trusted-software-stack.pdf"},{"key":"7_CR10","unstructured":"Microsoft Developer Network: TPM Base Services, http:\/\/msdn.microsoft.com\/en-us\/library\/aa446796%28VS.85%29.aspx"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-540-77048-0_33","volume-title":"Information and Communications Security","author":"Z. Zhou","year":"2007","unstructured":"Zhou, Z., Xu, R.: BIOS Security Analysis and a Kind of Trusted BIOS. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol.\u00a04861, pp. 427\u2013437. Springer, Heidelberg (2007)"},{"key":"7_CR12","unstructured":"Phoenix Technologies: Phoenix SecureCore, http:\/\/www.phoenix.com\/ptec\/docs\/securecore_ds_en.pdf"},{"key":"7_CR13","unstructured":"Microsoft: BitLocker Drive Encryption: Technical Overview, http:\/\/technet.microsoft.com\/en-us\/library\/cc732774.aspx"},{"key":"7_CR14","unstructured":"Trusted Computing Group TPM Working Group: TPM Main Part 3 Commands Specification Version 1.2 Level 2 Revision 103, http:\/\/www.trustedcomputinggroup.org\/files\/static_page_files\/ACD28F6C-1D09-3519-AD210DC2597F1E4C\/mainP3Commandsrev103.pdf"},{"key":"7_CR15","unstructured":"FIPS: Specification for the Advanced Encryption Standard (AES), In: Federal Information Processing Standards Publication 197, http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"7_CR16","unstructured":"Microsoft: Next-Generation Secure Computing Base General Information http:\/\/technet.microsoft.com\/en-us\/library\/cc723472.aspx"},{"key":"7_CR17","volume-title":"Trusted Computing Systeme","author":"T. Mueller","year":"2008","unstructured":"Mueller, T.: Trusted Computing Systeme. Springer, Heidelberg (2008)"},{"key":"7_CR18","unstructured":"Trusted Computing Group: TCG Specification Architecture Overview http:\/\/www.trustedcomputinggroup.org\/files\/resource_files\/AC652DE1-1D09-3519-ADA026A0C05CFAC2\/TCG_1_4_Architecture_Overview.pdf"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Eastlake III, D., Jones, P.: US Secure Hash Algorithm 1 (SHA1). RFC 3174 (2001)","DOI":"10.17487\/rfc3174"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:44:47Z","timestamp":1606167887000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}