{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T14:58:28Z","timestamp":1725634708948},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642252822"},{"type":"electronic","value":"9783642252839"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25283-9_14","type":"book-chapter","created":{"date-parts":[[2011,11,17]],"date-time":"2011-11-17T16:31:18Z","timestamp":1321547478000},"page":"200-218","source":"Crossref","is-referenced-by-count":3,"title":["Can Hand-Held Computers Still Be Better Smart Cards?"],"prefix":"10.1007","author":[{"given":"Sandeep","family":"Tamrakar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jan-Erik","family":"Ekberg","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pekka","family":"Laitinen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"N.","family":"Asokan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tuomas","family":"Aura","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"ARM. Technical reference manual: Arm 1176jzf-s (trustzone-enabled processor), \n                    \n                      http:\/\/www.arm.com\/pdfs\/DDI0301D_arm1176jzfs_r0p2_trm.pdf"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-540-85230-8_31","volume-title":"Financial Cryptography and Data Security","author":"N. Asokan","year":"2008","unstructured":"Asokan, N., Ekberg, J.-E.: A platform for onboard credentials. In: Tsudik, G. (ed.) FC 2008. LNCS, vol.\u00a05143, pp. 318\u2013320. Springer, Heidelberg (2008)"},{"key":"14_CR3","first-page":"2","volume-title":"SSYM 1999: Proceedings of the 8th Conference on USENIX Security Symposium","author":"D. Balfanz","year":"1999","unstructured":"Balfanz, D., Felten, E.W.: Hand-held computers can be better smart cards. In: SSYM 1999: Proceedings of the 8th Conference on USENIX Security Symposium, p. 2. USENIX Association, Berkeley (1999)"},{"key":"14_CR4","unstructured":"Microsoft: TechNet library - Smart Cards, \n                    \n                      http:\/\/technet.microsoft.com\/en-us\/library\/bb742533.aspx\n                    \n                    \n                   (accessed 2010)"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-14597-1_2","volume-title":"Trusted Systems","author":"J.-E. Ekberg","year":"2010","unstructured":"Ekberg, J.-E., Asokan, N.: External authenticated non-volatile memory with lifecycle management for state protection in trusted computing. In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol.\u00a06163, pp. 16\u201338. Springer, Heidelberg (2010)"},{"key":"14_CR6","unstructured":"Ekberg, J.-E., Asokan, N., Kostiainen, K., Rantala, A.: Onboard credentials platform: Design and implementation. Technical Report NRC-TR-2008-001, Nokia Research Center (August 2008), \n                    \n                      http:\/\/research.nokia.com\/files\/NRCTR2008007.pdf"},{"key":"14_CR7","unstructured":"Ekberg, J.-E., Kylanpaa, M.: Mobile trusted module. Technical Report NRC-TR-2007-015, Nokia Research Center (November 2007), \n                    \n                      http:\/\/research.nokia.com\/files\/NRCTR2007015.pdf"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/NDSS.1995.390639","volume-title":"Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS 1995)","author":"R. Ganesan","year":"1995","unstructured":"Ganesan, R.: Yaksha: augmenting kerberos with public key cryptography. In: Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS 1995), p. 132. IEEE Computer Society, Washington, DC, USA (1995)"},{"key":"14_CR9","unstructured":"Ion, I., Dragovic, B.: Don\u2019t trust pos terminals! verify in-shop payments with your mobile phone. In: SPMU 2008, Sydney, Australia (May 2008)"},{"key":"14_CR10","unstructured":"ISO\/IEC 7816-15: Identification cards - Integrated circuit cards - Part 15: Cryptographic information application, 1st edn. ISO, Geneva, Switzerland (2004)"},{"key":"14_CR11","unstructured":"ISO\/IEC\u00a07816-3: Identification cards - Integrated circuit cards - Part 3: Cards with contacts - Electrical interface and transmission protocols, 3rd edn. ISO, Geneva, Switzerland (2006)"},{"key":"14_CR12","unstructured":"ISO\/IEC 7816-4: Identification cards - Integrated circuit cards - Part 4: Organization, security and commands for interchange, 2nd edn. ISO, Geneva, Switzerland (2005)"},{"key":"14_CR13","unstructured":"ISO\/IEC\u00a07816-8: Identification cards - Integrated circuit cards - Part 8: Commands for security operations. 2nd edn. ISO, Geneva, Switzerland (2004)"},{"key":"14_CR14","unstructured":"ISO\/IEC\u00a07816-9: Identification cards - Integrated circuit cards - Part 8: Commands for card management, 2nd edn. ISO, Geneva, Switzerland (2004)"},{"key":"14_CR15","unstructured":"Kostiainen, K., Asokan, N., Ekberg, J.-E.: Credential disabling from trusted execution environments. In: Aura, T., Nyberg, K. (eds.) Preproceedings of the 15th Nordic Conference on Secure IT Systems (Nordsec 2010), pp. 162\u2013177. Aalto University School of Science and Technology (December 2010)"},{"key":"14_CR16","first-page":"104","volume-title":"Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS 2009","author":"K. Kostiainen","year":"2009","unstructured":"Kostiainen, K., Ekberg, J.-E., Asokan, N., Rantala, A.: On-board credentials with open provisioning. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS 2009, pp. 104\u2013115. ACM, New York (2009)"},{"key":"14_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/3-540-45831-X_20","volume-title":"Infrastructure Security","author":"T. Kwon","year":"2002","unstructured":"Kwon, T.: Virtual software tokens - A practical way to secure PKI roaming. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol.\u00a02437, pp. 288\u2013302. Springer, Heidelberg (2002)"},{"key":"14_CR18","unstructured":"RSA Laboratories (ed.) PKCS # 11: Cryptographic Token Interface Standard. v2.20, RSA Laboratories (2004)"},{"key":"14_CR19","unstructured":"Mac OS X Reference Library: Security Architecture, \n                    \n                      http:\/\/www.developer.apple.com\/mac\/library\/documentation\/Security\/Conceptual\/Security_Overview\/Architecture\/Architecture.html"},{"key":"14_CR20","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1145\/1352592.1352625","volume-title":"Proceedings of the 3rd ACM SIGOPS\/EuroSys European Conference on Computer Systems 2008, Eurosys 2008","author":"J.M. McCune","year":"2008","unstructured":"McCune, J.M., Parno, B.J., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: an execution infrastructure for tcb minimization. In: Proceedings of the 3rd ACM SIGOPS\/EuroSys European Conference on Computer Systems 2008, Eurosys 2008, pp. 315\u2013328. ACM, New York (2008)"},{"key":"14_CR21","unstructured":"Morgner, F., Oepen, D.: Eine virtualisierte smartcardarchitektur f\u00fcr mobile endger\u00e4te. Master\u2019s thesis, Institut f\u00fcr Informatik Systemarchitektur, Humboldt University, ZuBerlin (2009)"},{"key":"14_CR22","unstructured":"NIST. Security requirements for cryptographic modules, \n                    \n                      http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html"},{"key":"14_CR23","unstructured":"Perlman, R., Kaufman, C.: Secure password-based protocol for downloading a private key. In: Proceedings of the 1999 Network and Distributed System Security (1999)"},{"key":"14_CR24","unstructured":"Sandhu, R., Bellare, M., Ganesan, R.: Virtual smartcards versus virtual soft tokens. In: Smith, S. (ed.) 1st Annual PKI Research Workshop, pp. 89\u201394. Dartmouth College Computer Science Department (April 2002)"},{"key":"14_CR25","unstructured":"Schuba, M., Gerstenberger, V., Lahaije, P.: Internet id - flexible re-use of mobile phone authentication security for service access (2004), \n                    \n                      http:\/\/www1.ericsson.com\/res\/thecompany\/docs\/journal_conference_papers\/service_layer\/internet_id_nordsec.pdf"},{"key":"14_CR26","unstructured":"Srage, J., Azema, J.: M-Shield mobile security technology, TI White paper (2005), \n                    \n                      http:\/\/focus.ti.com\/pdfs\/wtbu\/ti_mshield_whitepaper.pdf"},{"key":"14_CR27","unstructured":"Trusted Platform Module (TPM) Specifications, \n                    \n                      https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/"},{"key":"14_CR28","unstructured":"PCSC Workgroup (ed.) Interoperability Specification for ICCs and Personal Computer Systems - Part 1. Introduction and Architecture Overview. Revision 2.01.01, PC\/SC Workgroup Specifications (September 2005)"},{"key":"14_CR29","unstructured":"PCSC Workgroup (ed.) Interoperability Specification for ICCs and Personal Computer Systems - Part 5. ICC Resource Manager Defination. Revision 2.01.01, PC\/SC Workgroup Specifications (September 2005)"},{"key":"14_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/3-540-36159-6_24","volume-title":"Information and Communications Security","author":"K.-P. Yee","year":"2002","unstructured":"Yee, K.-P.: User interaction design for secure systems. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 278\u2013290. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25283-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,18]],"date-time":"2019-04-18T17:50:22Z","timestamp":1555609822000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25283-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642252822","9783642252839"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25283-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}