{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T21:10:33Z","timestamp":1743628233894,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642316678"},{"type":"electronic","value":"9783642316685"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31668-5_20","type":"book-chapter","created":{"date-parts":[[2012,6,28]],"date-time":"2012-06-28T04:34:43Z","timestamp":1340858083000},"page":"261-273","source":"Crossref","is-referenced-by-count":1,"title":["Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals"],"prefix":"10.1007","author":[{"given":"Gergely","family":"Alp\u00e1r","sequence":"first","affiliation":[]},{"given":"Jaap-Henk","family":"Hoepman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-540-85886-7_2","volume-title":"Information Security","author":"E. Bangerter","year":"2008","unstructured":"Bangerter, E., Djackov, M., Sadeghi, A.-R.: A Demonstrative Ad Hoc Attestation System. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol.\u00a05222, pp. 17\u201330. Springer, Heidelberg (2008)"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"S. Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"key":"20_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"T-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a0T-22, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Practical nfc peer-to-peer relay attack using mobile phones. IACR Eprint archive (April 2010)","DOI":"10.1007\/978-3-642-16822-2_4"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1145\/1378600.1378623","volume-title":"Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services, MobiSys 2008","author":"S. Garriss","year":"2008","unstructured":"Garriss, S., C\u00e1ceres, R., Berger, S., Sailer, R., van Doorn, L., Zhang, X.: Trustworthy and personalized computing on public kiosks. In: Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services, MobiSys 2008, pp. 199\u2013210. ACM, New York (2008)"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-00730-9_7","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"C.H. Kim","year":"2009","unstructured":"Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The Swiss-Knife RFID Distance Bounding Protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol.\u00a05461, pp. 98\u2013115. Springer, Heidelberg (2009)"},{"issue":"1-2","key":"20_CR7","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1504\/IJSN.2009.023425","volume":"4","author":"J.M. McCune","year":"2009","unstructured":"McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: using camera phones for human-verifiable authentication. International Journal of Security and Networks\u00a04(1-2), 43\u201356 (2009)","journal-title":"International Journal of Security and Networks"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Oprea, A., Balfanz, D., Durfee, G., Smetters, D.K.: Securing a remote terminal application with a mobile trusted device. In: ACSAC, pp. 438\u2013447 (2004)","DOI":"10.1109\/CSAC.2004.33"},{"key":"20_CR9","first-page":"1","volume-title":"Proceedings of the 3rd Conference on Hot Topics in Security","author":"B. Parno","year":"2008","unstructured":"Parno, B.: Bootstrapping trust in a \u201ctrusted\u201d platform. In: Proceedings of the 3rd Conference on Hot Topics in Security, pp. 9:1\u20139:6. USENIX Association, Berkeley (2008)"},{"key":"20_CR10","unstructured":"Pearson, S. (ed.): Trusted computing platforms: TCPA technology in context. HP Professional Series. Prentice Hall PTR (2003)"},{"key":"20_CR11","unstructured":"Smart, N.P.: Cryptography, An Introduction, 3rd edn. (2011), http:\/\/tinyurl.com\/yeafjcx"},{"key":"20_CR12","unstructured":"Stumpf, F., Tafreschi, O., R\u00f6der, P., Eckert, C.: A robust integrity reporting protocol for remote attestation. In: Second Workshop on Advances in Trusted Computing (WATC 2006 Fall), Tokyo, Japan, pp. 25\u201336 (November 2006)"},{"key":"20_CR13","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s11227-010-0407-1","volume":"55","author":"R. Toegl","year":"2011","unstructured":"Toegl, R., Hutter, M.: An approach to introducing locality in remote attestation using near field communications. J. Supercomput.\u00a055, 207\u2013227 (2011)","journal-title":"J. Supercomput."}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for Life"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31668-5_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T20:47:13Z","timestamp":1743626833000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31668-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642316678","9783642316685"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31668-5_20","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}