{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:03:23Z","timestamp":1743084203518,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_35","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"455-470","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A TCB Minimizing Model of Computation"],"prefix":"10.1007","author":[{"given":"Naila","family":"Bushra","sequence":"first","affiliation":[]},{"given":"Naresh","family":"Adhikari","sequence":"additional","affiliation":[]},{"given":"Mahalingam","family":"Ramkumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"35_CR1","unstructured":"Bright, P.: Meltdown and Spectre: Here\u2019s what Intel, Apple, Microsoft, others are doing about it. Ars Technica, 5 January 2018"},{"key":"35_CR2","unstructured":"De Lucia, M.J.: A Survey on Security Isolation of Virtualization, Containers, and Unikernels. ARL-TR-8029, May 2017"},{"key":"35_CR3","unstructured":"Percival, C.: Cache missing for fun and profit. In: BSDCan (2005). \n                  https:\/\/www.bsdcan.org\/2015\/"},{"key":"35_CR4","unstructured":"Lipp, M., et al.: ARMageddon: cache attacks on mobile devices. IN: USENIX Security Symposium (2016)"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Singaravelu, L., Pu, C., Haertig, H., Helmuth, C.: Reducing TCB complexity for security-sensitive applications: three case studies. In: Proceedings of the ACM European Conference in Computer Systems (2006)","DOI":"10.1145\/1217935.1217951"},{"issue":"4","key":"35_CR6","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1145\/1357010.1352625","volume":"42","author":"JM McCune","year":"2004","unstructured":"McCune, J.M., Parno, B.J., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: an execution infrastructure for TCB minimization. ACM SIGOPS Oper. Syst. Rev. 42(4), 315\u2013328 (2004)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"von Neumann, J.: First Draft of a Report on the EDVAC. University of Pennsylvania, Moore School of Electrical Engineering (1945)","DOI":"10.5479\/sil.538961.39088011475779"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Bozic, N., Pujolle, G., Secci, S.: A tutorial on blockchain and applications to secure network control-planes. In: Smart Cloud Networks & Systems (SCNS). IEEE (2016)","DOI":"10.1109\/SCNS.2016.7870552"},{"key":"35_CR9","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)"},{"key":"35_CR10","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. In: Ethereum Project Yellow Paper (2014)"},{"key":"35_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Advances in Cryptology \u2014 CRYPTO 1987","author":"RC Merkle","year":"1988","unstructured":"Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369\u2013378. Springer, Heidelberg (1988). \n                  https:\/\/doi.org\/10.1007\/3-540-48184-2_32"},{"issue":"3","key":"35_CR12","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/2695533.2695545","volume":"42","author":"I Bentov","year":"2014","unstructured":"Bentov, I., Charles, L., Mizrahi, A., Rosenfeld, M.: Proof of activity: extending bitcoin\u2019s proof of work via proof of stake. ACM SIGMETRICS Perform. Eval. Rev. 42(3), 34\u201337 (2014)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"35_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-63688-7_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"A Kiayias","year":"2017","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 357\u2013388. Springer, Cham (2017). \n                  https:\/\/doi.org\/10.1007\/978-3-319-63688-7_12"},{"key":"35_CR14","unstructured":"Bentov, I., Pass, R., Shi, E.: Snow White: Provably secure proofs of stake. IACR Cryptology ePrint Archive, 2016:919 (2016)"},{"key":"35_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07584-6","volume-title":"Symmetric Cryptographic Protocols","author":"M Ramkumar","year":"2014","unstructured":"Ramkumar, M.: Symmetric Cryptographic Protocols. Springer, Cham (2014). \n                  https:\/\/doi.org\/10.1007\/978-3-319-07584-6"},{"issue":"10","key":"35_CR16","doi-asserted-by":"publisher","first-page":"996","DOI":"10.1145\/6617.6621","volume":"29","author":"MD Atkinson","year":"1986","unstructured":"Atkinson, M.D., Sack, J.R., Santoro, N., Strothotte, T.: Min-max heaps and generalized priority queues. Commun. ACM 29(10), 996\u20131000 (1986)","journal-title":"Commun. ACM"},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Fuhao, Z., Jiping, L.: An algorithm of shortest path based on Dijkstra for huge data. In: Sixth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2009, vol. 4. IEEE (2009)","DOI":"10.1109\/FSKD.2009.848"},{"key":"35_CR18","unstructured":"Intel Corporation. LaGrande technology preliminary architecture specification. Intel Publication no. D52212, May 2006"},{"key":"35_CR19","unstructured":"Advanced Micro Devices. AMD64 virtualization: Secure virtual machine architecture reference manual. AMD Publication no. 33047 rev. 3.01, May 2005"},{"key":"35_CR20","doi-asserted-by":"crossref","unstructured":"Parno, B., Howell, J., Gentry, C., Raykova, M.: Pinocchio: nearly practical verifiable computation. In: S & P (2013)","DOI":"10.1109\/SP.2013.47"},{"key":"35_CR21","unstructured":"Ben-Sasson, E., Chiesa, A., Tromer, E., Virza, M.: Succinct non-interactive zero knowledge for a von neumann architecture. In: Security (2014)"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:51:57Z","timestamp":1558396317000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_35","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}