{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:45:27Z","timestamp":1742989527696,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176494"},{"type":"electronic","value":"9783642176500"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17650-0_22","type":"book-chapter","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T10:22:11Z","timestamp":1291630931000},"page":"311-324","source":"Crossref","is-referenced-by-count":1,"title":["A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms"],"prefix":"10.1007","author":[{"given":"Kurt","family":"Dietrich","sequence":"first","affiliation":[]},{"given":"Johannes","family":"Winter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/3-540-36178-2_26","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"M. Abe","year":"2002","unstructured":"Abe, M., Ohkubo, M., Suzuki, K.: 1-out-of-n signatures from a variety of keys. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 415\u2013432. Springer, Heidelberg (2002)"},{"key":"22_CR2","series-title":"CRC Press series on discrete mathematics and its applications","volume-title":"Handbook of applied cryptography","author":"S.A. Vanstone","year":"1997","unstructured":"Vanstone, S.A., Menezes, A.J., Van Oorschot, P.C.: Handbook of applied cryptography. CRC Press series on discrete mathematics and its applications. CRC Press, Boca Raton (1997); Includes bibliographical references (p. 703\u2013754) and index"},{"key":"22_CR3","first-page":"132","volume-title":"Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004","author":"E. Brickell","year":"2004","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 132\u2013145. ACM, New York (2004)"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/978-3-540-73420-8_38","volume-title":"Automata, Languages and Programming","author":"N. Chandran","year":"2007","unstructured":"Chandran, N., Groth, J., Sahai, A.: Ring signatures of sub-linear size without random oracles. In: Arge, L., Cachin, C., Jurdzi\u0144ski, T., Tarlecki, A. (eds.) ICALP 2007. LNCS, vol.\u00a04596, pp. 423\u2013434. Springer, Heidelberg (2007)"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-85886-7_3","volume-title":"Information Security","author":"L. Chen","year":"2008","unstructured":"Chen, L., L\u00f6hr, H., Manulis, M., Sadeghi, A.-R.: Property-based attestation without a trusted third party. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol.\u00a05222, pp. 31\u201346. Springer, Heidelberg (2008)"},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-540-78663-4_12","volume-title":"Trustworthy Global Computing","author":"K. Dietrich","year":"2008","unstructured":"Dietrich, K., Pirker, M., Vejda, T., Toegl, R., Winkler, T., Lipp, P.: A practical approach for establishing trust relationships between remote platforms using trusted computing. In: Barthe, G., Fournet, C. (eds.) TGC 2007 and FODO 2008. LNCS, vol.\u00a04912, pp. 156\u2013168. Springer, Heidelberg (2008)"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/978-3-540-24676-3_36","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Kiayias, A., Nicolosi, A., Shoup, V.: Anonymous identification in ad hoc groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 609\u2013626. Springer, Heidelberg (2004)"},{"key":"22_CR8","volume-title":"ASN.1: communication between heterogeneous systems","author":"O. Dubuisson","year":"2001","unstructured":"Dubuisson, O., Fouquart, P.: ASN.1: communication between heterogeneous systems. Morgan Kaufmann Publishers Inc., San Francisco (2001)"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Housley, R. (RSA Laboratories), Polk, W. (NIST), Ford, W. (VeriSign), Solo, D. Citigroup: Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile - rfc 3280 (2002)","DOI":"10.17487\/rfc3280"},{"key":"22_CR10","unstructured":"Intel. Intel Desktop Board DQ45CB Technical Product Specification (September 2008), \n                    \n                      http:\/\/downloadmirror.intel.com\/16958\/eng\/DQ45CB_TechProdSpec.pdf"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/3-540-45682-1_32","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"R.L. Rivest","year":"2001","unstructured":"Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 552\u2013565. Springer, Heidelberg (2001)"},{"key":"22_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"C.P. Schnorr","year":"1990","unstructured":"Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 239\u2013252. Springer, Heidelberg (1990)"},{"key":"22_CR13","unstructured":"The OpenSSL Project. OpenSSL. Programa de computador (December 1998)"},{"key":"22_CR14","unstructured":"Trusted Computing Group - TPM Working Group. TPM Main Part 3 Commands (October 26, 2006), Specification available online at \n                    \n                      http:\/\/www.trustedcomputinggroup.org\/files\/static_page_files\/ACD28F6C-1D09-3519-AD210DC2597F1E4C\/mainP3Commandsrev103.pdf\n                    \n                    \n                  ; Specification version 1.2 Level 2 Revision 103"},{"key":"22_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-540-31979-5_5","volume-title":"Information Security Practice and Experience","author":"P.P. Tsang","year":"2005","unstructured":"Tsang, P.P., Wei, V.K.: Short linkable ring signatures for e-voting, e-cash and attestation. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds.) ISPEC 2005. LNCS, vol.\u00a03439, pp. 48\u201360. Springer, Heidelberg (2005)"},{"key":"22_CR16","unstructured":"TrouSerS The opensource TCG Software Stack (November 2, 2007)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17650-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:17:55Z","timestamp":1566764275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17650-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176494","9783642176500"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17650-0_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}