{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:27:33Z","timestamp":1725575253509},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642181771"},{"type":"electronic","value":"9783642181788"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18178-8_8","type":"book-chapter","created":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T11:09:47Z","timestamp":1295089787000},"page":"84-98","source":"Crossref","is-referenced-by-count":18,"title":["Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices"],"prefix":"10.1007","author":[{"given":"Christian","family":"Wachsmann","sequence":"first","affiliation":[]},{"given":"Liqun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kurt","family":"Dietrich","sequence":"additional","affiliation":[]},{"given":"Hans","family":"L\u00f6hr","sequence":"additional","affiliation":[]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Winter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"123","DOI":"10.3233\/JCS-2010-0367","volume":"18","author":"C. Ardagna","year":"2010","unstructured":"Ardagna, C., Camenisch, J., Kohlweiss, M., Leenes, R., Neven, G., Priem, B., Samarati, P., Sommer, D., Verdicchio, M.: Exploiting cryptography for privacy-enhanced access control: A result of the PRIME project. Journal of Computer Security\u00a018, 123\u2013160 (2010)","journal-title":"Journal of Computer Security"},{"key":"8_CR2","unstructured":"ARM: TrustZone website (September 2009), http:\/\/www.arm.com\/products\/security\/trustzone\/"},{"key":"8_CR3","unstructured":"ARM, Ltd.: Instruction set architectures. ARM White Paper (February 2008), http:\/\/www.arm.com\/products\/processors\/technologies\/instruction-set-architectures.php"},{"key":"8_CR4","unstructured":"Azema, J., Fayad, G.: M-ShieldTM mobile security technology: Making wireless secure. Texas Instruments White Paper (February 2008), http:\/\/focus.ti.com\/pdfs\/wtbu\/ti_mshield_whitepaper.pdf"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-642-12510-2_15","volume-title":"Smart Card Research and Advanced Application","author":"L. Batina","year":"2010","unstructured":"Batina, L., Hoepman, J.H., Jacobs, B., Mostowski, W., Vullers, P.: Developing efficient blinded attribute certificates on smart cards via pairings. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 209\u2013222. Springer, Heidelberg (2010)"},{"key":"8_CR6","unstructured":"Bichsel, P., Binding, C., Camenisch, J., Gro\u00df, T., Heydt-Benjamin, T., Sommer, D., Zaverucha, G.: Cryptographic protocols of the identity mixer library. Tech. Rep. RZ\u00a03730 (#99740), IBM Research (2009)"},{"key":"8_CR7","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009)","author":"P. Bichsel","year":"2009","unstructured":"Bichsel, P., Camenisch, J., Gro\u00df, T., Shoup, V.: Anonymous credentials on a standard Java Card. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009). ACM Press, New York (2009)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Blake-Wilson, S., Nystrom, M., Hopwood, D., Mikkelsen, J., Wright, T.: Transport layer security (TLS) extensions (2003)","DOI":"10.17487\/rfc3546"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1145\/1030083.1030103","volume-title":"Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004)","author":"E. Brickell","year":"2004","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004), pp. 132\u2013145. ACM Press, New York (2004)"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 93\u2013118. Springer, Heidelberg (2001)"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-28628-8_4","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"J. Camenisch","year":"2004","unstructured":"Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 56\u201372. Springer, Heidelberg (2004)"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-642-13869-0_4","volume-title":"Trust and Trustworthy Computing","author":"E. Cesena","year":"2010","unstructured":"Cesena, E., L\u00f6hr, H., Ramunno, G., Sadeghi, A.R., Vernizzi, D.: Anonymous authentication with TLS and DAA. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol.\u00a06101, pp. 47\u201362. Springer, Heidelberg (2010)"},{"issue":"10","key":"8_CR13","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM\u00a028(10), 1030\u20131044 (1985)","journal-title":"Communications of the ACM"},{"key":"8_CR14","unstructured":"Chen, L., Dietrich, K., L\u00f6hr, H., Sadeghi, A.R., Wachsmann, C., Winter, J.: Lightweight anonymous authentication with TLS and DAA for embedded mobile devices (full version). ePrint (2010)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-642-12510-2_16","volume-title":"Smart Card Research and Advanced Application","author":"L. Chen","year":"2010","unstructured":"Chen, L., Page, D., Smart, N.P.: On the design and implementation of an efficient DAA scheme. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 223\u2013237. Springer, Heidelberg (2010)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-642-14597-1_6","volume-title":"Trusted Systems","author":"K. Dietrich","year":"2010","unstructured":"Dietrich, K.: Anonymous credentials for Java enabled platforms. In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol.\u00a06163, pp. 101\u2013116. Springer, Heidelberg (2010)"},{"key":"8_CR17","unstructured":"Google, Inc.: Google Maps Navigation, http:\/\/www.google.com\/mobile\/navigation\/"},{"key":"8_CR18","unstructured":"Google, Inc.: Google Latitude (June 2010), http:\/\/www.google.com\/latitude"},{"key":"8_CR19","unstructured":"Lindell, A.Y.: Anonymous authentication. Aladdin Knowledge Systems Inc. (2006), http:\/\/www.aladdin.com\/blog\/pdf\/AnonymousAuthentication.pdf"},{"key":"8_CR20","unstructured":"Loopt: Loopt website (June 2010), http:\/\/www.loopt.com\/"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/3-540-46513-8_14","volume-title":"Selected Areas in Cryptography","author":"A. Lysyanskaya","year":"2000","unstructured":"Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol.\u00a01758, pp. 184\u2013199. Springer, Heidelberg (2000)"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/11496137_22","volume-title":"Applied Cryptography and Network Security","author":"L. Nguyen","year":"2005","unstructured":"Nguyen, L., Safavi-Naini, R.: Dynamic k-times anonymous authentication. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 318\u2013333. Springer, Heidelberg (2005)"},{"key":"8_CR23","unstructured":"Nokia: OviMaps website (June 2010), http:\/\/maps.ovi.com\/"},{"key":"8_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/3-540-48390-X_14","volume-title":"Financial Cryptography","author":"S. Schechter","year":"1999","unstructured":"Schechter, S., Parnell, T., Hartemink, A.: Anonymous authentication of membership in dynamic groups. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol.\u00a01648, pp. 184\u2013195. Springer, Heidelberg (1999)"},{"key":"8_CR25","unstructured":"Sense Networks, Inc.: CitySense (June 2010), http:\/\/www.citysense.com\/"},{"key":"8_CR26","unstructured":"TomTom: TomTom website (June 2010), http:\/\/www.tomtom.com\/"},{"key":"8_CR27","unstructured":"Trusted Computing Group: TCG TPM Specification, Version 1.2, Revision 103 (July 2007), http:\/\/www.trustedcomputinggroup.org\/"},{"key":"8_CR28","unstructured":"Trusted Computing Group: TCG MTM Specification, Version 1.0, Revision 6 (June 2008), http:\/\/www.trustedcomputinggroup.org\/"},{"key":"8_CR29","unstructured":"Trusted Computing Group: TCG website (June 2010), https:\/\/www.trustedcomputinggroup.org"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18178-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T18:11:36Z","timestamp":1559931096000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18178-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642181771","9783642181788"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18178-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}