{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T11:10:06Z","timestamp":1746357006086,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662449653"},{"type":"electronic","value":"9783662449660"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44966-0_31","type":"book-chapter","created":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T11:41:36Z","timestamp":1409139696000},"page":"325-334","source":"Crossref","is-referenced-by-count":1,"title":["Authentication of Trusted Platform Module Using Processor Response"],"prefix":"10.1007","author":[{"given":"Vikash Kumar","family":"Rai","sequence":"first","affiliation":[]},{"given":"Arun","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","unstructured":"Design of secure authentication and transaction protocol: In: Proceeding of International Conference on Computer Science and Service System (CSSS) (2011)"},{"key":"31_CR2","unstructured":"Parno, B., McCune, J.M., Perrig, A.: Bootstrapping Trust in Modern Computers"},{"key":"31_CR3","unstructured":"Trusted Computing Group: Trusted Platform Module Main Specification. Version 1.2, Revision 116 (2011)"},{"key":"31_CR4","unstructured":"Trusted Computing Group: PC client specific TPM interface specification (TIS). Version 1.21, Revision 1.00 (2011)"},{"key":"31_CR5","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the USENIX Security Symposium (2004)"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proceedings of the IEEE Symposium on Security and Privacy (2005)","DOI":"10.21236\/ADA457868"},{"key":"31_CR7","unstructured":"Lang, P.: Flash the Intel BIOS with confidence. Intel Developer UPDATE Magazine (2002)"},{"key":"31_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-642-00587-9_7","volume-title":"Trusted Computing","author":"M. Pirker","year":"2009","unstructured":"Pirker, M., Toegl, R., Hein, D., Danner, P.: A PrivacyCA for anonymity and trust. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol.\u00a05471, pp. 101\u2013119. Springer, Heidelberg (2009)"},{"key":"31_CR9","unstructured":"http:\/\/www.kcchao.wikidot.com\/tpm (2014)"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Smith, S.W.: Outbound authentication for programmable secure coprocessors. Journal of Information Security 3 (2004)","DOI":"10.1007\/s10207-004-0033-0"},{"key":"31_CR11","unstructured":"http:\/\/www.ma.rhul.ac.uk (2014)"},{"key":"31_CR12","unstructured":"McCune, J.M.: Flicker: Minimal TCB Code Execution"},{"key":"31_CR13","unstructured":"http:\/\/www.grounation.org\/?post\/2008\/07\/04\/8-"},{"key":"31_CR14","unstructured":"Gasser, M., Goldstein, A., Kaufman, C., Lampson, B.: The digital distributed system security architecture. In: Proceedings of the National Computer Security Conference (1989)"},{"key":"31_CR15","unstructured":"Trusted computing and trusted network connect in a nutshell"},{"key":"31_CR16","unstructured":"http:\/\/www.trust.f4.hs-hannover.de (2014)"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Arbaugh, W.A., Farber, D.J., Smith, J.M.: A reliable bootstrap architecture. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 65\u201371 (1997)","DOI":"10.1109\/SECPRI.1997.601317"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Maiti, A., Schaumont, P.: A novel microprocessor intrinsic physical uncloneable function. In: 2012 22nd International Conference on Field Programmable Logic and Applications (FPL), pp. 380\u2013387 (August 2012)","DOI":"10.1109\/FPL.2012.6339208"},{"key":"31_CR19","unstructured":"Challenger, et al.: A Practice guide to trusted computing. IBM Press (2008)"},{"key":"31_CR20","unstructured":"Trusted Computing Group (TCG), TPM main part 1.2.3, Design, principles, specifications version 1.2 (2011)"},{"issue":"2","key":"31_CR21","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"M.L. Das","year":"2004","unstructured":"Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics\u00a050(2), 629\u2013631 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"31_CR22","unstructured":"Liu, J.-S.: A TPM Authentication Scheme for Mobile IP. In: International Conference on Computational Intelligence and Security Workshops (2007)"},{"key":"31_CR23","unstructured":"Lee, H., Choi, D., Lee, Y., Won, D., Kim, S.: Security Weaknesses of Dynamic ID-based Remote User Authentication Protocol"},{"issue":"4","key":"31_CR24","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.comcom.2008.11.008","volume":"32","author":"Y. Wang","year":"2009","unstructured":"Wang, Y., Liu, J., Xiao, F., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications\u00a032(4), 583\u2013585 (2009)","journal-title":"Computer Communications"},{"key":"31_CR25","unstructured":"Li, L., Li, C., Zhou, Y.: A Remote Anonymous Attestation Scheme With improves CA. In: International Conference on Multimedia Information Network and Security (2009)"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44966-0_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T10:50:56Z","timestamp":1746355856000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44966-0_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662449653","9783662449660"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44966-0_31","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}