{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:26:52Z","timestamp":1764239212844},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2004,10,1]],"date-time":"2004-10-01T00:00:00Z","timestamp":1096588800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJIS"],"published-print":{"date-parts":[[2004,10]]},"DOI":"10.1007\/s10207-004-0033-0","type":"journal-article","created":{"date-parts":[[2004,5,18]],"date-time":"2004-05-18T12:05:28Z","timestamp":1084881928000},"page":"28-41","source":"Crossref","is-referenced-by-count":26,"title":["Outbound authentication for programmable secure coprocessors"],"prefix":"10.1007","volume":"3","author":[{"given":"Sean W.","family":"Smith","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2004,10,1]]},"reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Arbaugh W, Farber D, Smith J (1997) A secure and reliable bootstrap architecture. In: Proceedings of the IEEE symposium on security and privacy. IEEE Press, New York, pp 65\u201371","DOI":"10.1109\/SECPRI.1997.601317"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Asonov D, Freytag J (2003) Almost optimal private information retrieval. In: Dingledine R, Syverson P (eds) Privacy enhancing technologies. Lecture notes in computer science, vol 2482. Springer, Berlin Heidelberg New York, pp 209\u2013223","DOI":"10.1007\/3-540-36467-6_16"},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Bellare M, Miner S (1999) A forward-secure digital signature scheme. In: Wiener M (ed) Proceedings of Advances in Cryptology \u2013 Crypto 99. Lecture notes in computer science, vol 1666. Springer, Berlin Heidelberg New York, pp 431\u2013448","DOI":"10.1007\/3-540-48405-1_28"},{"key":"33_CR4","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/2.955101","volume":"34","author":"Bond","year":"2001","unstructured":"Bond M, Anderson R (2001) API-level attacks on embedded systems. IEEE Comput 34:64\u201375","journal-title":"IEEE Comput"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Chaum D, Pedersen T (1993) Wallet databases with observers. In: Brickell E (ed) Proceedings of Advances in Cryptology \u2013 Crypto \u201992. Lecture notes in computer science, vol 740. Springer, Berlin Heidelberg New York, pp 89\u2013105","DOI":"10.1007\/3-540-48071-4_7"},{"key":"33_CR6","unstructured":"Chen B, Morris R (2003) Certifying program execution with secure processors. In: Proceedings of the 9th conference on hot topics in operating systems (HOTOS-IX). USENIX"},{"key":"33_CR7","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/188280.188371","volume":"37","author":"Clark","year":"1994","unstructured":"Clark P, Hoffmann L (1994) Bits: A smartcard protected operating system. Commun ACM 37:66\u201370","journal-title":"Commun ACM"},{"key":"33_CR8","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/2.955100","volume":"34","author":"Dyer","year":"2001","unstructured":"Dyer J, Lindemann M, Perez R, Sailer R, Smith SW, van Doorn L, Weingart S (2001) Building the IBM 4758 secure coprocessor. IEEE Comput 34(October):57\u201366","journal-title":"IEEE Comput"},{"key":"33_CR9","unstructured":"Dyer J, Perez R, Smith SW, Lindemann M (1999) Application support architecture for a high-performance, programmable secure coprocessor. In: Proceedings of the 22nd National Information Systems Security conference"},{"key":"33_CR10","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MC.2003.1212691","volume":"36","author":"England","year":"2003","unstructured":"England P, Lampson B, Manferdelli J, Peinado M, Willman B (2003) A trusted open platform. IEEE Comput 36:55\u201362","journal-title":"IEEE Comput"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"G\u00fcnther, CG (1990) An identity-based key-exchange protocol. In: Quiswater J-J, Vandewalle J (eds) Proceedings of Advances in Cryptology \u2013 Eurocrypt \u201989. Lecture notes in computer science, vol 434. Springer, Berlin Heidelberg New York, pp 29\u201337","DOI":"10.1007\/3-540-46885-4_5"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Iliev A, Smith SW (2003) Prototyping an armored data vault: rights management for big brother\u2019s computer. In: Dingledine R, Syverson P (eds) Privacy enhancing technologies. Lecture notes in computer science, vol 2482. Springer, Berlin Heidelberg New York, pp 144\u2013159","DOI":"10.1007\/3-540-36467-6_11"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Jiang S, Smith SW, Minami K (2001) Securing web servers against insider attack. In: Proceedings of the 17th annual computer security applications conference. IEEE Press, New York, pp 265\u2013276","DOI":"10.1109\/ACSAC.2001.991542"},{"key":"33_CR14","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1109\/49.839931","volume":"18","author":"Kohlas","year":"2000","unstructured":"Kohlas R, Maurer U (2000) Reasoning about public-key certification: on bindings between entities and public keys. J Select Areas Commun 18:551\u2013560","journal-title":"J Select Areas Commun"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Lie D, Thekkath C, Mitchell M, Lincoln P, Boneh D, Mitchell J, Horowitz M (2000) Architectural Support for Copy and Tamper Resistant Software. In: Proceedings of the 9th international conference on architectural support for programming languages and operating systems. ACM Press, New York, pp 168\u2013177","DOI":"10.1145\/356989.357005"},{"key":"33_CR16","unstructured":"Marchesini J, Smith SW, Wild O, MacDonald R (2003) Experimenting with TCPA\/TCG hardware, or: How I learned to stop worrying and love the bear. Computer Science Technical Report TR2003-476, Dartmouth College"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Maurer U (1996) Modelling a public-key infrastructure. In: Bertino E, Kurth H, Martella G, Montolivo E (eds) Proceedings of Computer Security \u2013 ESORICS 96. Lecture notes in computer science, vol 1146. Springer, Berlin Heidelberg New York","DOI":"10.1007\/3-540-61770-1_45"},{"key":"33_CR18","unstructured":"McGregor P, Lee R (2003) Virtual secure co-processing on general-purpose processors, Computer Engineering Technical Report CE-L2002-003, Princeton"},{"key":"33_CR19","first-page":"TCPA","volume":"platforms","author":"Pearson","year":"2003","unstructured":"Pearson S (ed) (2003) Trusted computing platforms: TCPA technology in context. Prentice-Hall, Upper Saddle River, NJ","journal-title":"Trusted computing"},{"key":"33_CR20","unstructured":"Smith SW (1996) Secure coprocessing applications and research issues. Los Alamos Unclassified Release LA-UR-96-2805, Los Alamos National Laboratory"},{"key":"33_CR21","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1147\/sj.403.0683","volume":"40","author":"Smith","year":"2001","unstructured":"Smith SW, Safford D (2001) Practical server privacy using secure coprocessors. IBM Sys J 40:683\u2013695","journal-title":"IBM Sys J"},{"key":"33_CR22","doi-asserted-by":"crossref","unstructured":"Smith SW, Palmer E, Weingart S (1998) Using a high-performance, programmable secure coprocessor. In: Hirschfeld R (ed) Financial cryptography. Lecture notes in computer science, vol 1465. Springer, Berlin Heidelberg New York, pp 73\u201389","DOI":"10.1007\/BFb0055474"},{"key":"33_CR23","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1016\/S1389-1286(98)00019-X","volume":"31","author":"Smith","year":"1999","unstructured":"Smith SW, Weingart S (1999) Building a high-performance, programmable secure coprocessor. Comput Netw 31:831\u2013860","journal-title":"Comput Netw"},{"key":"33_CR24","unstructured":"Stam N (2003), Inside Intel\u2019s secretive \u2018LaGrande\u2019 project. http:\/\/www.extremetech.com\/"},{"key":"33_CR25","doi-asserted-by":"crossref","unstructured":"Suh G, Clarke D, Gassend B, van Dijk M, Devadas S (2003) AEGIS: architecture for tamper-evident and tamper-resistant processing. In: Proceedings of the 17th international conference on supercomputing. ACM Press, New York, pp 160\u2013171","DOI":"10.1145\/782814.782838"},{"key":"33_CR26","doi-asserted-by":"crossref","unstructured":"Trusted Computing Platform Alliance (2001) TCPA design philosophies and concepts, version 1.0","DOI":"10.1016\/S1353-4858(01)00312-9"},{"key":"33_CR27","unstructured":"Tygar JD, Yee BS (1993) Dyad: a system for using physically secure coprocessors. In: Proceedings of the joint Harvard-MIT workshop on technological strategies for the protection of intellectual property in the network multimedia environment"},{"key":"33_CR28","unstructured":"Yee BS (1994) Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, Pittsburgh, PA, May 1994. Also available as Computer Science Technical Report CMU-CS-94-149"},{"key":"33_CR29","unstructured":"Yee BS (1997) A sanctuary for mobile agents. Computer Science Technical Report CS97-537, UCSD"},{"key":"33_CR30","unstructured":"Yee BS, Tygar JD (1995) Secure coprocessors in electronic commerce applications. In: Proceedings of the 1st USENIX Electronic Commerce workshop. USENIX, pp 155\u2013170"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-004-0033-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-004-0033-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-004-0033-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T04:59:09Z","timestamp":1585803549000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-004-0033-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2004,10]]}},"alternative-id":["33"],"URL":"https:\/\/doi.org\/10.1007\/s10207-004-0033-0","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,10]]}}}