{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:05:34Z","timestamp":1770221134219,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642380297","type":"print"},{"value":"9783642380303","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38030-3_5","type":"book-chapter","created":{"date-parts":[[2013,4,5]],"date-time":"2013-04-05T04:20:18Z","timestamp":1365135618000},"page":"72-84","source":"Crossref","is-referenced-by-count":18,"title":["Hardware Security for Device Authentication in the Smart Grid"],"prefix":"10.1007","author":[{"given":"Andrew J.","family":"Paverd","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrew P.","family":"Martin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"European Commission: Eurostat: Final Energy Consumption, by Sector (2010)"},{"key":"5_CR2","unstructured":"National Institute of Standards and Technology (NIST): NIST Special Publication 1108R2: NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0. Technical report (2012)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Baumeister, T.: Adapting PKI for the smart grid. In: 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 249\u2013254 (2011)","DOI":"10.1109\/SmartGridComm.2011.6102327"},{"issue":"1","key":"5_CR4","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/TSG.2010.2046347","volume":"1","author":"A.R. Metke","year":"2010","unstructured":"Metke, A.R., Ekl, R.L.: Security Technology for Smart Grid Networks. IEEE Transactions on Smart Grid\u00a01(1), 99\u2013107 (2010)","journal-title":"IEEE Transactions on Smart Grid"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/11766155_26","volume-title":"Emerging Trends in Information and Communication Security","author":"J. N\u00fctzel","year":"2006","unstructured":"N\u00fctzel, J., Beyer, A.: How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer\u2019s Security. In: M\u00fcller, G. (ed.) ETRICS 2006. LNCS, vol.\u00a03995, pp. 368\u2013380. Springer, Heidelberg (2006)"},{"key":"5_CR6","unstructured":"Trusted Computing Group: TPM Main Specifications Part 1: Design principles, Part 2: TPM structures, Part 3: Commands. Version 1.2, Revision 116 (2011)"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/11545262_24","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"U. K\u00fchn","year":"2005","unstructured":"K\u00fchn, U., Kursawe, K., Lucks, S., Sadeghi, A.-R., St\u00fcble, C.: Secure data management in trusted computing. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 324\u2013338. Springer, Heidelberg (2005)"},{"key":"5_CR8","unstructured":"Intel: Intel Trusted Execution Technology (Intel TXT): Measured Launch Environment Developer\u2019s Guide. Technical report (2011)"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"McCune, J.M., Parno, B.J., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: an execution infrastructure for TCB minimization. In: Eurosys 2008 Proceedings of the 3rd ACM SIGOPS\/EuroSys European Conference on Computer Systems, vol.\u00a042, pp. 315\u2013328 (April 2008)","DOI":"10.1145\/1352592.1352625"},{"key":"5_CR10","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th Conference on USENIX Security Symposium, vol.\u00a013. USENIX Association (2004)"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1867635.1867641","volume-title":"Proceedings of the Fifth ACM Workshop on Scalable Trusted Computing, STC 2010","author":"S. Bugiel","year":"2010","unstructured":"Bugiel, S., Ekberg, J.E.: Implementing an application-specific credential platform using late-launched mobile trusted module. In: Proceedings of the Fifth ACM Workshop on Scalable Trusted Computing, STC 2010, pp. 21\u201330. ACM Press, New York (2010)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Kinkelin, H., Holz, R., Niedermayer, H., Mittelberger, S., Carle, G.: On Using TPM for Secure Identities in Future Home Networks. In: Security in NGNs and the Future Internet, vol.\u00a03, pp. 1\u201313 (January 2010)","DOI":"10.3390\/fi3010001"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Kuntze, N., Rudolph, C., Bente, I., Vieweg, J., von Helden, J.: Interoperable device identification in Smart-Grid environments. In: 2011 IEEE Power and Energy Society General Meeting, pp. 1\u20137. IEEE (July 2011)","DOI":"10.1109\/PES.2011.6039416"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Gajek, S., L\u00f6hr, H., Sadeghi, A.R., Winandy, M.: TruWallet: trustworthy and migratable wallet-based web authentication. In: Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, STC 2009, pp. 19\u201328. ACM (2009)","DOI":"10.1145\/1655108.1655112"},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/1355284.1355290","volume-title":"Proceedings of the 1st European Workshop on System Security, EUROSEC 2008","author":"E. Cesena","year":"2008","unstructured":"Cesena, E., Ramunno, G., Vernizzi, D.: Secure storage using a sealing proxy. In: Proceedings of the 1st European Workshop on System Security, EUROSEC 2008, pp. 27\u201334. ACM Press, New York (2008)"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1179474.1179481","volume-title":"Proceedings of the First ACM Workshop on Scalable Trusted Computing, STC 2006","author":"K. Goldman","year":"2006","unstructured":"Goldman, K., Perez, R., Sailer, R.: Linking remote attestation to secure tunnel endpoints. In: Proceedings of the First ACM Workshop on Scalable Trusted Computing, STC 2006, pp. 21\u201324. ACM Press, New York (2006)"},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/1314354.1314363","volume-title":"Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, STC 2007","author":"Y. Gasmi","year":"2007","unstructured":"Gasmi, Y., Sadeghi, A.R., Stewin, P., Unger, M., Asokan, N.: Beyond secure channels. In: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, STC 2007, pp. 30\u201340. ACM Press, New York (2007)"}],"container-title":["Lecture Notes in Computer Science","Smart Grid Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38030-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T03:50:25Z","timestamp":1557633025000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38030-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380297","9783642380303"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38030-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}