{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:37:53Z","timestamp":1725568673550},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642144516"},{"type":"electronic","value":"9783642144523"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14452-3_15","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T12:30:15Z","timestamp":1288701015000},"page":"331-348","source":"Crossref","is-referenced-by-count":2,"title":["Signal Authentication in Trusted Satellite Navigation Receivers"],"prefix":"10.1007","author":[{"given":"Markus G.","family":"Kuhn","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,10,12]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"R.J. Anderson, in On the Security of Digital Tachographs. European Symposium on Research in Computer Security (ESORICS), Louvain-la-Neuve, Belgium, 16\u201318 Sept 1998. Lecture Notes in Computer Science, vol. 1485 (Springer, 1998), pp. 111\u2013125","DOI":"10.1007\/BFb0055859"},{"key":"15_CR2","unstructured":"R.J. Anderson, M.G. Kuhn, in Tamper Resistance \u2014 A Cautionary Note. The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland, CA, USA, 18\u201321 Nov 1996 (USENIX Association, 1996) pp. 1\u201311"},{"key":"15_CR3","unstructured":"Anti-tamper physical security for electronic hardware. GORE http:\/\/www.gore.com\/en_xx\/products\/electronic\/specialty\/antitamper.html"},{"key":"15_CR4","volume-title":"A Software-Defined GPS and Galileo Receiver","author":"K. Borre","year":"2007","unstructured":"K. Borre, D.M. Akos, N. Bertelsen, P. Rinder, S.H. Jensen, A Software-Defined GPS and Galileo Receiver (Birkh\u00e4user, Boston, MA, 2007)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"J.A. Garay, J. Staddon, A. Wool, in Long-Lived Broadcast Encryption. Advances in Cryptology (CRYPTO), Santa Barbara, CA, USA, 20\u201324 Aug 2000. Lecture Notes in Computer Science, vol. 1880 (Springer, 2000), pp. 333\u2013352","DOI":"10.1007\/3-540-44598-6_21"},{"key":"15_CR6","unstructured":"GPS Interface Control Document, ICD-GPS-200C, 2003-01-14"},{"issue":"1","key":"15_CR7","first-page":"28","volume":"20","author":"T.E. Humphreys","year":"2009","unstructured":"T.E. Humphreys, B.M. Ledvina, M.L. Psiaki, B.W. O\u2019Hanlon, P.M. Kintner, Assessing the spoofing threat. GPS World 20(1), 28\u201338 (Jan 2009)","journal-title":"GPS World"},{"key":"15_CR8","first-page":"7","volume":"62","author":"S. Joshi","year":"2008","unstructured":"S. Joshi, Addressing the physical security of encryption keys. Maxim Eng. J. 62, 7\u201311 (2008) http:\/\/pdfserv.maxim-ic.com\/en\/ej\/EJ62.pdf","journal-title":"Maxim Eng. J."},{"key":"15_CR9","volume-title":"Understanding GPS: Principles and Applications","author":"E.D. Kaplan","year":"2006","unstructured":"E.D. Kaplan, C.J. Hegarty, Understanding GPS: Principles and Applications, 2nd edn. (Artech House, Norwood, MA 2006)","edition":"2"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"M.G. Kuhn in An Asymmetric Security Mechanism for Navigation Signals. 6th Information Hiding Workshop, Toronto, Canada, 23\u201325 May 2004. Lecture Notes in Computer Science, vol. 3200 (Springer, 2004), pp. 239\u2013252","DOI":"10.1007\/978-3-540-30114-1_17"},{"key":"15_CR11","volume-title":"Global Positioning System: Theory and Applications \u2013 Volume I. Progress in Astronautics and Aeronautics, Vol. 163","author":"B.W. Parkinson","year":"1996","unstructured":"B.W. Parkinson, J.J. Spilker Jr., Global Positioning System: Theory and Applications \u2013 Volume I. Progress in Astronautics and Aeronautics, Vol. 163 (American Institute of Aeronautics and Astronautics, Washington, DC, 1996), ISBN 1-56347-106-X"},{"key":"15_CR12","unstructured":"M.L. Psiaki, Spoofing Detection for Civilian GNSS Signals via Aiding from Encrypted Signals, Savannah, GA, USA, 22\u201325 Sept (ION GNSS, 2009)"},{"key":"15_CR13","first-page":"1543","volume-title":"Anti-Spoofing & Authenticated Signal Architectures for Civil Navigation Systems","author":"L. Scott","year":"2003","unstructured":"L. Scott, in Anti-Spoofing & Authenticated Signal Architectures for Civil Navigation Systems. Proceedings of ION GPS\/GNSS (Institute of Navigation, Portland, OR, USA, 9\u201312 Sept 2003), pp. 1543\u20131552"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"S.H. Weingart, Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses. Cryptographic Hardware and Embedded Systems (CHES), Worcester, MA, USA, 17\u201318 Aug 2000. Lecture Notes in Computer Science, vol. 1965 (Springer, 2000), pp. 45\u201368","DOI":"10.1007\/3-540-44499-8_24"},{"key":"15_CR15","unstructured":"H. Wen, P.Y.-R. Huang, J. Dyer, J. Archinal, J. Fagan, Countermeasures for GPS Signal Spoofing, Long Beach, CA, USA, 13\u201316 Sept 2005 (ION GNSS, 2005)"}],"container-title":["Information Security and Cryptography","Towards Hardware-Intrinsic Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14452-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T21:29:49Z","timestamp":1559770189000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14452-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642144516","9783642144523"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14452-3_15","relation":{},"ISSN":["1619-7100"],"issn-type":[{"type":"print","value":"1619-7100"}],"subject":[],"published":{"date-parts":[[2010]]}}}