{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T14:58:32Z","timestamp":1725634712592},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642252822"},{"type":"electronic","value":"9783642252839"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25283-9_1","type":"book-chapter","created":{"date-parts":[[2011,11,17]],"date-time":"2011-11-17T16:31:18Z","timestamp":1321547478000},"page":"1-25","source":"Crossref","is-referenced-by-count":2,"title":["Seamless Integration of Trusted Computing into Standard Cryptographic Frameworks"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Reiter","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Georg","family":"Neubauer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Kapfenberger","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Johannes","family":"Winter","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kurt","family":"Dietrich","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Cross Platform, open source .NET development framework, http:\/\/www.mono-project.com\/"},{"key":"1_CR2","unstructured":"IBM Software Trusted Platform Module, http:\/\/www.ibmswtpm.sourceforge.net\/"},{"key":"1_CR3","unstructured":"The Legion of the Bouncy Castle, http:\/\/www.bouncycastle.org\/"},{"key":"1_CR4","unstructured":"Mono credential passing, documentation http:\/\/www.go-mono.com\/docs\/index.aspx?tlink=18@ecmaf"},{"key":"1_CR5","unstructured":"OpenSSL API, http:\/\/www.openssl.org\/"},{"key":"1_CR6","unstructured":"Software-based TPM Emulator, http:\/\/www.tpm-emulator.berlios.de\/"},{"key":"1_CR7","unstructured":"TrouSerS, http:\/\/www.trousers.sourceforge.net\/"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","volume-title":"Trustworthy Global Computing","year":"2008","unstructured":"Barthe, G., Fournet, C. (eds.): TGC 2007. LNCS, vol.\u00a04912. Springer, Heidelberg (2008)"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-642-14597-1_6","volume-title":"Trusted Systems","author":"K. Dietrich","year":"2010","unstructured":"Dietrich, K.: Anonymous credentials for java enabled platforms: A performance evaluation. In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol.\u00a06163, pp. 88\u2013103. Springer, Heidelberg (2010)"},{"key":"1_CR10","unstructured":"IAIK. jTSS, http:\/\/www.trustedjava.sourceforge.net\/"},{"key":"1_CR11","unstructured":"IAIK\/OpenTC. jTSS Wrapper, http:\/\/www.trustedjava.sourceforge.net\/"},{"key":"1_CR12","unstructured":"Microsoft. Microsoft cryptoapi and cryptographic service providers (2010), http:\/\/technet.microsoft.com\/en-us\/library\/cc962093.aspx"},{"key":"1_CR13","unstructured":"Oracle. Java Cryptography Architecture, http:\/\/download.oracle.com\/javase\/1.5.0\/docs\/guide\/security\/CryptoSpec.html"},{"key":"1_CR14","unstructured":"Oracle. Java Cryptography Extension, http:\/\/download.oracle.com\/javase\/1.5.0\/docs\/guide\/security\/jce\/JCERefGuide.html"},{"key":"1_CR15","unstructured":"PKCS#11: Cryptographic Token Interface Standard, CA. RSA Laboratories, Redwood City (2009), http:\/\/www.rsa.com\/rsalabs\/node.asp?id=2133"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"St\u00fcble, C., Zaerin, A.: \u03bcTSS - A Simplified Trusted Software Stack (2010), http:\/\/www.sirrix.de\/content\/pages\/forschungsarbeiten.htm","DOI":"10.1007\/978-3-642-13869-0_9"},{"key":"1_CR17","unstructured":"TCG. TCG Software Stack (TSS) Specification (March 7, 2007), specification http:\/\/www.trustedcomputinggroup.org\/resources\/tcg_software_stack_tss_specification , Specification version 1.2 Level 1 Errata A."},{"key":"1_CR18","unstructured":"TCG. TPM Main Part 3 Commands (July 9, 2007), specification http:\/\/www.trustedcomputinggroup.org\/resources\/tpm_main_specification , Specification version 1.2 Level 2 Revision 103"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25283-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,19]],"date-time":"2019-06-19T18:49:24Z","timestamp":1560970164000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25283-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642252822","9783642252839"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25283-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}