{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:34:51Z","timestamp":1725528891992},"publisher-location":"Wiesbaden","reference-count":7,"publisher":"Vieweg+Teubner","isbn-type":[{"type":"print","value":"9783834806604"},{"type":"electronic","value":"9783834892836"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-8348-9283-6_40","type":"book-chapter","created":{"date-parts":[[2009,3,6]],"date-time":"2009-03-06T16:17:39Z","timestamp":1236356259000},"page":"380-389","source":"Crossref","is-referenced-by-count":0,"title":["Securing Flash Technology: How Does It Look From Inside?"],"prefix":"10.1007","author":[{"given":"Helena","family":"Handschuh","sequence":"first","affiliation":[]},{"given":"Elena","family":"Trichina","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","unstructured":"Alves, Tiago, Rudelic, J.: ARM Security Solutions and Intel Authenticated Flash. White Paper, 2007. http:\/\/www.arm.com\/pdfs\/Intel_ARM_Security_White_Paper.pdf"},{"key":"40_CR2","unstructured":"Bertoni, Guido: Secure Non-volatile Memory: Is it a New Trend for the Security of Embedded Systems? Presented at the LSEC & IMEC Security Forum 2007. http:\/\/www.lsec.be\/upload_directories\/documents\/6STM_Securenonvolatiememory_Bertoni_Guido.pdf"},{"key":"40_CR3","unstructured":"Flash Memory Modules Add Security to Handsets. Electronicstalk, 2007. http:\/\/www.electronicstalk.com\/news\/ssi\/ssi125.html"},{"key":"40_CR4","doi-asserted-by":"crossref","unstructured":"Handschuh, Helena and Trichina, Elena: Securing Flash Technology. In: Breveglieri, L., Gueron, S., Koren, I., Nacccache, D., Seifert, J.-P. (Eds) 4th Int. Workshop on Fault Diagnosis and Tolerance in Cryptography \u2014 FDTC 2007. IEEE CSP, 2007, p. 3\u201317.","DOI":"10.1109\/FDTC.2007.9"},{"key":"40_CR5","unstructured":"Schellekens, Dries, Tuyls, Pim, Preneel, Bart: Embedded Trusted Computing with Authenticated Nonvolatile Memory. In: Lipp, P., Sadeghi, A.-R., and Kock, K.-M. (Eds): TRUST 2008, LNCS 4968, 2008, p.60\u201374."},{"key":"40_CR6","unstructured":"Security Features for NOR Flash Memories. AT Microelectronics, 2005. http:\/\/www.st.com\/flash"},{"key":"40_CR7","unstructured":"Steil, Michael: 17 Mistakes Microsoft Made in Xbox Security. Presented at the 22nd Chaos Communication Congress, Berlin, Germany, 2005. http:\/\/www.xbox-linux.org\/wiki\/17_Mistakes_Microsoft_Made_in-the_Xbox_Security_System"}],"container-title":["ISSE 2008 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-8348-9283-6_40.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T12:23:00Z","timestamp":1606134180000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-8348-9283-6_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783834806604","9783834892836"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-8348-9283-6_40","relation":{},"subject":[]}}