{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:52:05Z","timestamp":1725900725723},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642145964"},{"type":"electronic","value":"9783642145971"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14597-1_14","type":"book-chapter","created":{"date-parts":[[2010,7,9]],"date-time":"2010-07-09T13:50:13Z","timestamp":1278683413000},"page":"227-235","source":"Crossref","is-referenced-by-count":0,"title":["Trusted Firmware Services Based on TPM"],"prefix":"10.1007","author":[{"given":"Zhenlong","family":"Du","sequence":"first","affiliation":[]},{"given":"Xiaoli","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kangkang","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"CSI Computer Scrime&Security Survey (2008)","key":"14_CR1"},{"unstructured":"Trusted Computing Group, \n                    \n                      http:\/\/www.trustedcomputinggroup.org\/","key":"14_CR2"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-540-76837-1_10","volume-title":"Advanced Parallel Processing Technologies","author":"X. Zhang","year":"2007","unstructured":"Zhang, X., Zhang, S., Deng, Z.: Virtual Disk Monitor Based on Multi-core EFI. In: Xu, M., Zhan, Y.-W., Cao, J., Liu, Y. (eds.) APPT 2007. LNCS, vol.\u00a04847, pp. 60\u201369. Springer, Heidelberg (2007)"},{"key":"14_CR4","volume-title":"Beyond BIOS: Implementing the Unified Extensible Firmware Interface with Intel\u2019s Framework","author":"V. Zimmer","year":"2006","unstructured":"Zimmer, V., Rothman, M., Hale, R.: Beyond BIOS: Implementing the Unified Extensible Firmware Interface with Intel\u2019s Framework. Intel Press, Hillsboro (2006)"},{"unstructured":"Intel MultiProcessor Specification, Version 1.4 (May 1997)","key":"14_CR5"},{"unstructured":"Intel Unified Extensible Firmware Interface Specification, Version 2.1 (January 2007)","key":"14_CR6"},{"key":"14_CR7","volume-title":"Proceedings of the Eleventh SIGOPS European Workshop, ACM SIGOPS","author":"J. Hendricks","year":"2004","unstructured":"Hendricks, J., Doon, L.: Secure Bootstrap is Not Enough: Shoring up the Trusted Computing Base. In: Proceedings of the Eleventh SIGOPS European Workshop, ACM SIGOPS. ACM Press, New York (2004)"},{"issue":"4","key":"14_CR8","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/1218063.1217943","volume":"40","author":"T. Ball","year":"2006","unstructured":"Ball, T., Bounimova, E., Byron, C., Levin, V., et al.: Thorough static analysis of device drivers. ACM SIGOPS Operating Systems Review\u00a040(4), 73\u201385 (2006)","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"4","key":"14_CR9","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/1218063.1217941","volume":"40","author":"M.F. Spear","year":"2006","unstructured":"Spear, M.F., Roeder, T., Hodson, O., Hunt, G.C., et al.: Solving the starting problem: device drivers as self-describing artifacts. ACM SIGOPS Operating Systems Review\u00a040(4), 45\u201357 (2006)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/11935308_31","volume-title":"Information and Communications Security","author":"G. Wang","year":"2006","unstructured":"Wang, G., Bao, F., Zhou, J.: The Fairness of Perfect Concurrent Signatures. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 435\u2013451. Springer, Heidelberg (2006)"},{"unstructured":"TCG EFI Protocol, Version 1.20 Final, Revision 1.00, June 9 (2006)","key":"14_CR11"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-540-68979-9_13","volume-title":"Trusted Computing - Challenges and Applications","author":"E. Brickell","year":"2008","unstructured":"Brickell, E., Chen, L., Li, J.: A new direct anonymous attestation scheme from bilinear maps. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol.\u00a04968, pp. 166\u2013178. Springer, Heidelberg (2008)"},{"doi-asserted-by":"crossref","unstructured":"Suzaki, K., Iijima, K., Yagi, T., Quynh, N.A.: Trusted Boot and Platform Trust Services on 1CD Linux. In: Proc. of Third Asia-Pacific Trusted Infrastructure Technologies Conf. (October 2008)","key":"14_CR13","DOI":"10.1109\/APTC.2008.23"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14597-1_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:34:08Z","timestamp":1619786048000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14597-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642145964","9783642145971"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14597-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}