{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:24:37Z","timestamp":1743067477636,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642173578"},{"type":"electronic","value":"9783642173585"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17358-5_51","type":"book-chapter","created":{"date-parts":[[2010,11,24]],"date-time":"2010-11-24T12:06:22Z","timestamp":1290600382000},"page":"649-656","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Aware Device Identifier through a Trusted Web Service"],"prefix":"10.1007","author":[{"given":"Marcelo","family":"da Cruz Pinto","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ricardo","family":"Morin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maria Emilia","family":"Torino","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Danny","family":"Varner","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"51_CR1","unstructured":"Trusted computing group software stack (2010), \n                      \n                        http:\/\/www.trustedcomputinggroup.org\/developers\/software_stack"},{"key":"51_CR2","unstructured":"Trusted platform module (2010), \n                      \n                        http:\/\/www.trustedcomputinggroup.org\/developers\/trusted_platform_module"},{"key":"51_CR3","unstructured":"Xml digital signature (2010), \n                      \n                        http:\/\/www.xml.com\/pub\/a\/2001\/08\/08\/xmldsig.html"},{"key":"51_CR4","doi-asserted-by":"crossref","unstructured":"Balfe, S., Lakhani, A.D., Paterson, K.G.: Trusted computing: Providing security for peer-to-peer networks. In: IEEE International Conference on Peer-to-Peer Computing, pp. 117\u2013124 (2005)","DOI":"10.1109\/P2P.2005.40"},{"key":"51_CR5","unstructured":"CyberSource: 2010 fraud report (2010), \n                      \n                        http:\/\/www.cybersource.com\/cgi-bin\/resource_center\/resources.cgi"},{"key":"51_CR6","unstructured":"McFadden, T.: Tpm matrix (2006), \n                      \n                        http:\/\/www.tonymcfadden.net\/tpmvendors_arc.html"},{"key":"51_CR7","unstructured":"Ahamad, M., et al: Emerging cyber threats report for 2009 (2008), \n                      \n                        http:\/\/www.gtisc.gatech.edu\/pdf\/CyberThreatsReport2009.pdf"},{"issue":"12","key":"51_CR8","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R.M. Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM\u00a021(12), 993\u2013999 (1978)","journal-title":"Commun. ACM"},{"issue":"12","key":"51_CR9","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.1109\/JPROC.2003.819611","volume":"91","author":"L. O\u2019Gorman","year":"2003","unstructured":"O\u2019Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE\u00a091(12), 2021\u20132040 (2003)","journal-title":"Proceedings of the IEEE"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17358-5_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T07:43:45Z","timestamp":1553240625000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17358-5_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642173578","9783642173585"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17358-5_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}