{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:11:20Z","timestamp":1761621080074},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642252822"},{"type":"electronic","value":"9783642252839"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25283-9_15","type":"book-chapter","created":{"date-parts":[[2011,11,17]],"date-time":"2011-11-17T11:31:18Z","timestamp":1321529478000},"page":"219-236","source":"Crossref","is-referenced-by-count":9,"title":["TruWalletM: Secure Web Authentication on Mobile Platforms"],"prefix":"10.1007","author":[{"given":"Sven","family":"Bugiel","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alexandra","family":"Dmitrienko","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kari","family":"Kostiainen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcel","family":"Winandy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/1655108.1655112","volume-title":"STC 2009: Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing","author":"S. Gajek","year":"2009","unstructured":"Gajek, S., L\u00f6hr, H., Sadeghi, A.R., Winandy, M.: TruWallet: trustworthy and migratable wallet-based web authentication. In: STC 2009: Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, pp. 19\u201328. ACM, New York (2009)"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/ARES.2007.59","volume-title":"2nd International Conference on Availability, Reliability and Security (ARES 2007)","author":"S. Gajek","year":"2007","unstructured":"Gajek, S., Sadeghi, A.R., St\u00fcble, C., Winandy, M.: Compartmented security for browsers \u2013 or how to thwart a phisher with trusted computing. In: 2nd International Conference on Availability, Reliability and Security (ARES 2007), pp. 120\u2013127. IEEE Computer Society, Los Alamitos (2007)"},{"key":"15_CR3","unstructured":"Jackson, C., Boneh, D., Mitchell, J.: Spyware resistant web authentication using virtual machines (2006), http:\/\/www.crypto.stanford.edu\/spyblock\/"},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/ACSAC.2006.23","volume-title":"22nd Annual Computer Security Applications Conference (ACSAC 2006)","author":"R.C. Jammalamadaka","year":"2006","unstructured":"Jammalamadaka, R.C., van der Horst, T.W., Mehrotra, S., Seamons, K.E., Venkasubramanian, N.: Delegate: A proxy based architecture for secure website access from an untrusted machine. In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), pp. 57\u201366. IEEE Computer Society, Los Alamitos (2006)"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-72163-5_13","volume-title":"Information Security Practice and Experience","author":"P.C.S. Kwan","year":"2007","unstructured":"Kwan, P.C.S., Durfee, G.: Practical uses of virtual machines for protection of sensitive user data. In: Dawson, E., Wong, D.S. (eds.) ISPEC 2007. LNCS, vol.\u00a04464, pp. 145\u2013161. Springer, Heidelberg (2007)"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-642-13869-0_6","volume-title":"Trust and Trustworthy Computing","author":"M. Selhorst","year":"2010","unstructured":"Selhorst, M., St\u00fcble, C., Feldmann, F., Gnaida, U.: Towards a trusted mobile desktop. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol.\u00a06101, pp. 78\u201394. Springer, Heidelberg (2010)"},{"key":"15_CR7","volume-title":"Proc. of the 4th ACM Symposium on Information, Computer, and Communications Security (ASIACCS 2009)","author":"K. Kostiainen","year":"2009","unstructured":"Kostiainen, K., Ekberg, J.E., Asokan, N., Rantala, A.: On-board credentials with open provisioning. In: Proc. of the 4th ACM Symposium on Information, Computer, and Communications Security (ASIACCS 2009). ACM, New York (2009)"},{"key":"15_CR8","unstructured":"Azema, J., Fayad, G.: M-Shield mobile security technology: making wireless secure. Texas Instruments White Paper (2008), http:\/\/focus.ti.com\/pdfs\/wtbu\/ti_mshield_whitepaper.pdf"},{"key":"15_CR9","unstructured":"Alves, T., Felton, D.: TrustZone: Integrated hardware and software security. Information Quaterly 3 (2004)"},{"key":"15_CR10","unstructured":"Heise Security: Hacker extracts crypto key from TPM chip (2010), http:\/\/www.h-online.com\/security\/news\/item\/Hacker-extracts-crypto-key-from-TPM-chip-927077.html ."},{"key":"15_CR11","unstructured":"Jackson, C., Boneh, D., Mitchell, J.: Transaction generators: Root kits for web. In: 2nd USENIX Workshop on Hot Topics in Security (HotSec 2007), pp. 1\u20134. USENIX Association (2007)"},{"key":"15_CR12","unstructured":"Ristic, I.: Internet SSL server survey. In: BlackHat, USA (2010)"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/1073001.1073009","volume-title":"SOUPS 2005: Proceedings of the 2005 Symposium on Usable Privacy and Security","author":"R. Dhamija","year":"2005","unstructured":"Dhamija, R., Tygar, J.D.: The battle against phishing: Dynamic security skins. In: SOUPS 2005: Proceedings of the 2005 Symposium on Usable Privacy and Security, pp. 77\u201388. ACM, New York (2005)"},{"key":"15_CR14","unstructured":"Bank of America: Identity Theft Fraud Protection from Bank of America (2010), http:\/\/www.bankofamerica.com\/privacy\/sitekey"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/3-540-47719-5_12","volume-title":"Information Security and Privacy","author":"N. Itoi","year":"2001","unstructured":"Itoi, N., Arbaugh, W.A., Pollack, S.J., Reeves, D.M.: Personal secure booting. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, pp. 130\u2013144. Springer, Heidelberg (2001)"},{"key":"15_CR16","unstructured":"Network Working Group: The transport layer security (TLS) protocol. version 1.2. Standards track (2008), http:\/\/tools.ietf.org\/html\/rfc5246"},{"key":"15_CR17","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1145\/1143120.1143133","volume-title":"2nd Symposium on Usable Privacy and Security (SOUPS 2006)","author":"M. Wu","year":"2006","unstructured":"Wu, M., Miller, R.C., Little, G.: Web Wallet: Preventing Phishing Attacks by Revealing User Intentions. In: 2nd Symposium on Usable Privacy and Security (SOUPS 2006), pp. 102\u2013113. ACM, New York (2006)"},{"key":"15_CR18","unstructured":"Maemo: Project website (2010), http:\/\/maemo.org"},{"key":"15_CR19","unstructured":"Paros: Project website (2010), http:\/\/www.parosproxy.org"},{"key":"15_CR20","first-page":"120","volume-title":"ARES 2007: Proceedings of the The Second International Conference on Availability, Reliability and Security","author":"S. Gajek","year":"2007","unstructured":"Gajek, S., Sadeghi, A.R., Stuble, C., Winandy, M.: Compartmented security for browsers - or how to thwart a phisher with trusted computing. In: ARES 2007: Proceedings of the The Second International Conference on Availability, Reliability and Security, pp. 120\u2013127. IEEE Computer Society, Washington, DC, USA (2007)"},{"key":"15_CR21","first-page":"51","volume-title":"SP 2007: Proceedings of the 2007 IEEE Symposium on Security and Privacy","author":"S.E. Schechter","year":"2007","unstructured":"Schechter, S.E., Dhamija, R., Ozment, A., Fischer, I.: The emperor\u2019s new security indicators. In: SP 2007: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp. 51\u201365. IEEE Computer Society, Washington, DC, USA (2007)"},{"key":"15_CR22","unstructured":"Petroni Jr., N.L., Fraser, T., Molina, J., Arbaugh, W.A.: Copilot - a coprocessor-based kernel runtime integrity monitor. In: Proceedings of the 13th USENIX Security Symposium, USENIX, pp. 179\u2013194 (2004)"},{"key":"15_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-642-00587-9_6","volume-title":"Trusted Computing","author":"F. Baiardi","year":"2009","unstructured":"Baiardi, F., Cilea, D., Sgandurra, D., Ceccarelli, F.: Measuring semantic integrity for remote attestation. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol.\u00a05471, pp. 81\u2013100. Springer, Heidelberg (2009)"},{"key":"15_CR24","unstructured":"Trusted\u00a0Computing Group: TPM Main Specification, Version 1.2 rev. 103 (2007)"},{"key":"15_CR25","unstructured":"Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: IEEE Symposium on Security and Privacy (S&P 1992), pp. 72\u201384 (1992)"},{"key":"15_CR26","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"D.P. Jablon","year":"1996","unstructured":"Jablon, D.P.: Strong password-only authenticated key exchange. Computer Communication Review\u00a026, 5\u201326 (1996)","journal-title":"Computer Communication Review"},{"key":"15_CR27","first-page":"97","volume-title":"Network and Distributed System Security Symposium (NDSS 1998)","author":"T. Wu","year":"1998","unstructured":"Wu, T.: The secure remote password protocol. In: Network and Distributed System Security Symposium (NDSS 1998), pp. 97\u2013111. The Internet Society, San Diego (1998)"},{"key":"15_CR28","unstructured":"Taylor, D., Wu, T., Mavrogiannopoulos, N., Perrin, T.: RFC5054: Using the secure remote password (SRP) protocol for TLS authentication (2007), http:\/\/www.ietf.org\/rfc\/rfc5054"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25283-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,16]],"date-time":"2021-12-16T19:29:17Z","timestamp":1639682957000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25283-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642252822","9783642252839"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25283-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}