{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:31:06Z","timestamp":1742913066489,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642279362"},{"type":"electronic","value":"9783642279379"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27937-9_12","type":"book-chapter","created":{"date-parts":[[2012,4,24]],"date-time":"2012-04-24T17:56:08Z","timestamp":1335290168000},"page":"171-186","source":"Crossref","is-referenced-by-count":4,"title":["Credential Disabling from Trusted Execution Environments"],"prefix":"10.1007","author":[{"given":"Kari","family":"Kostiainen","sequence":"first","affiliation":[]},{"given":"N.","family":"Asokan","sequence":"additional","affiliation":[]},{"given":"Jan-Erik","family":"Ekberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"ARM. Trustzone, \n                    \n                      http:\/\/www.arm.com\/products\/processors\/technologies\/trustzone.php"},{"key":"12_CR2","unstructured":"Bellare, M., Rogaway, P., Wagner, D.: EAX: A conventional authenticated-encryption mode. Cryptology ePrint Archive: Re-port 2003\/069 (September 2009), \n                    \n                      http:\/\/eprint.iacr.org\/2003\/069"},{"key":"12_CR3","unstructured":"Berger, S., Caceres, R., Goldman, K., Perez, R., Sailer, R., van Doorn, L.: vTPM - virtualizing the trusted platform module. In: Proceedings of 15th Usenix Security Symposium, pp. 305\u2013320 (2006)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-540-85893-5_10","volume-title":"Smart Card Research and Advanced Applications","author":"V. Costan","year":"2008","unstructured":"Costan, V., Sarmenta, L.F.G., van Dijk, M., Devadas, S.: The Trusted Execution Module: Commodity General-purpose Trusted Computing. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol.\u00a05189, pp. 133\u2013148. Springer, Heidelberg (2008)"},{"key":"12_CR5","unstructured":"Fischl, J. (ed.): Certificate Management Service for The Session Initiation Protocol (SIP) draft-ietf-sip-certs-09. Internet Engineering Task Force (September 2009)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Farrell, S. (ed.): Securely Available Credentials Protocol. Internet Engineering Task Force, RFC 3767 (June 2004)","DOI":"10.17487\/rfc3767"},{"key":"12_CR7","unstructured":"Heath, C.: Symbian OS Platform Security. Wiley (2006)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Holtmanns, S., Niemi, V., Ginzboorg, P., Laitinen, P., Asokan, N.: Cellular Authentication for Mobile and Internet Services. Wiley (2008)","DOI":"10.1002\/9780470771013"},{"key":"12_CR9","unstructured":"JavaCard Technology, \n                    \n                      http:\/\/www.oracle.com\/technetwork\/java\/javacard\/overview\/index.html"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Kostiainen, K., Ekberg, J.-E., Asokan, N., Rantala, A.: On-board cre-dentials with open provisioning. In: Proc. of ACM Symposium on Information,Computer & Communications Security, ASIACCS 2009 (2009)","DOI":"10.1145\/1533057.1533074"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/11545262_24","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"U. K\u00fchn","year":"2005","unstructured":"K\u00fchn, U., Kursawe, K., Lucks, S., Sadeghi, A.-R., St\u00fcble, C.: Secure Data Management in Trusted Computing. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 324\u2013338. Springer, Heidelberg (2005)"},{"key":"12_CR12","unstructured":"Nokia. Mobile Internet Technical Architecture - MITA. IT Press, Finland (2002)"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-540-68979-9_5","volume-title":"Trusted Computing - Challenges and Applications","author":"D. Schellekens","year":"2008","unstructured":"Schellekens, D., Tuyls, P., Preneel, B.: Embedded Trusted Computing with Authenticated Non-volatile Memory. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) TRUST 2008. LNCS, vol.\u00a04968, pp. 60\u201374. Springer, Heidelberg (2008)"},{"key":"12_CR14","unstructured":"Srage, J., Azema, J.: M-Shield mobile security technology, TI White paper (2005), \n                    \n                      http:\/\/focus.ti.com\/pdfs\/wtbu\/ti_mshield_whitepaper.pdf"},{"key":"12_CR15","unstructured":"Sundaresan, H.: OMAP platform security features, TI White paper (July 2003), \n                    \n                      http:\/\/focus.ti.com\/pdfs\/vf\/wireless\/platformsecuritywp.pdf"},{"key":"12_CR16","unstructured":"Symbian signed, \n                    \n                      https:\/\/www.symbiansigned.com"},{"key":"12_CR17","unstructured":"Trusted Platform Module (TPM) Specifications, \n                    \n                      https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/1314354.1314364","volume-title":"STC 2007: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing","author":"M. Dijk van","year":"2007","unstructured":"van Dijk, M., Rhodes, J., Sarmenta, L., Devadas, S.: Offline untrusted storage with immediate detection of forking and replay attacks. In: STC 2007: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pp. 41\u201348. ACM, New York (2007)"}],"container-title":["Lecture Notes in Computer Science","Information Security Technology for Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27937-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T09:11:56Z","timestamp":1556701916000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27937-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642279362","9783642279379"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27937-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}