{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T19:32:59Z","timestamp":1676921579524},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2010,3,19]],"date-time":"2010-03-19T00:00:00Z","timestamp":1268956800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2011,2]]},"DOI":"10.1007\/s11227-010-0407-1","type":"journal-article","created":{"date-parts":[[2010,3,18]],"date-time":"2010-03-18T13:23:53Z","timestamp":1268918633000},"page":"207-227","source":"Crossref","is-referenced-by-count":8,"title":["An approach to introducing locality in remote attestation using near field communications"],"prefix":"10.1007","volume":"55","author":[{"given":"Ronald","family":"Toegl","sequence":"first","affiliation":[]},{"given":"Michael","family":"Hutter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,3,19]]},"reference":[{"key":"407_CR1","unstructured":"Atmel Corporation (August 2007) 8-bit AVR microcontroller with 128K bytes in-system programmable flash. Available online at http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc2467.pdf"},{"key":"407_CR2","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/978-3-540-85886-7_2","volume-title":"ISC","author":"E Bangerter","year":"2008","unstructured":"Bangerter E, Djackov M, Sadeghi A-R (2008) A\u00a0demonstrative ad hoc attestation system. In: Wu T-C, Lei C-L, Rijmen V, Lee D-T (eds) ISC. Lecture notes in computer science, vol\u00a05222. Springer, Berlin, pp\u00a017\u201330"},{"key":"407_CR3","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1145\/1030083.1030103","volume-title":"Proceedings of the 11th ACM conference on computer and communications security","author":"E Brickell","year":"2004","unstructured":"Brickell E, Camenisch J, Chen L (2004) Direct anonymous attestation. In: Proceedings of the 11th ACM conference on computer and communications security, Washington DC, USA, 2004. ACM, New York, pp 132\u2013145"},{"key":"407_CR4","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/1067170.1067179","volume-title":"Proceedings of the 3rd international conference on mobile systems, applications, and services","author":"R C\u00e1ceres","year":"2005","unstructured":"C\u00e1ceres R, Carter C, Narayanaswami C, Raghunath M (2005) Reincarnating PCs with portable soulpads. In: Proceedings of the 3rd international conference on mobile systems, applications, and services, Seattle, Washington, 2005. ACM, New York, pp\u00a065\u201378"},{"key":"407_CR5","doi-asserted-by":"crossref","unstructured":"Chen L, Landfermann R, L\u00f6hr H, Rohe M, Sadeghi A-R, St\u00fcble C (2006) A protocol for property-based attestation. In: STC \u201906: Proceedings of the first ACM workshop on scalable trusted computing","DOI":"10.1145\/1179474.1179479"},{"key":"407_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-88625-9_1","volume-title":"ICICS\u201908: Proceedings of the 10th international conference on information and communications security","author":"G Coker","year":"2008","unstructured":"Coker G, Guttman J, Loscocco P, Sheehy J, Sniffen B (2008) Attestation: Evidence and trust. In: ICICS\u201908: Proceedings of the 10th international conference on information and communications security. Springer, Berlin, pp\u00a01\u201318"},{"key":"407_CR7","isbn-type":"print","volume-title":"The intel safer computing initiative","author":"D Grawrock","year":"2006","unstructured":"Grawrock D (2006) The intel safer computing initiative. Intel Press, Hillsboro. ISBN 0-9764832-6-2","ISBN":"http:\/\/id.crossref.org\/isbn\/0976483262"},{"key":"407_CR8","isbn-type":"print","volume-title":"Dynamics of a trusted platform: a building block approach","author":"D Grawrock","year":"2009","unstructured":"Grawrock D (2009) Dynamics of a trusted platform: a building block approach. Intel Press, Hillsboro. ISBN 978-1934053171","ISBN":"http:\/\/id.crossref.org\/isbn\/978193405317"},{"key":"407_CR9","unstructured":"ECMA International (December 2008) ECMA standard 385-2008: NFC-SEC: NFCIP-1 security services and protocol"},{"key":"407_CR10","unstructured":"ECMA International (December 2008) ECMA Standard 386-2008: NFC-SEC-01: NFC-SEC cryptography standard using ECDH and AES"},{"key":"407_CR11","unstructured":"EMSCB Project Consortium (2004) The European multilaterally secure computing base (EMSCB) project. http:\/\/www.emscb.org\/"},{"key":"407_CR12","first-page":"1","volume-title":"Trust \u201908: Proceedings of the 1st international conference on trusted computing and trust in information technologies","author":"P England","year":"2008","unstructured":"England P (2008) Practical techniques for operating system attestation. In: Trust \u201908: Proceedings of the 1st international conference on trusted computing and trust in information technologies. Springer, Berlin, pp\u00a01\u201313"},{"key":"407_CR13","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1145\/945445.945464","volume-title":"Proceedings of the 19th symposium on operating system principles (SOSP 2003)","author":"T Garfinkel","year":"2003","unstructured":"Garfinkel T, Pfaff B, Chow J, Rosenblum M, Boneh D (2003) Terra: A virtual machine-based platform for trusted computing. In: Proceedings of the 19th symposium on operating system principles (SOSP 2003). ACM Press, New York, pp\u00a0193\u2013206"},{"key":"407_CR14","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1145\/1378600.1378623","volume-title":"MobiSys","author":"S Garriss","year":"2008","unstructured":"Garriss S, C\u00e1ceres R, Berger S, Sailer R, van Doorn L, Zhang X (2008) Trustworthy and personalized computing on public kiosks. In: Grunwald D, Han R, de Lara E, Ellis CS (eds) MobiSys. ACM, New York, pp\u00a0199\u2013210"},{"key":"407_CR15","unstructured":"Hancke G (2008) Eavesdropping attacks on high-frequency RFID tokens. In: Workshop on RFID security 2008 (RFIDSec08), July 9\u201311, Budapest, Hungary, Vol RFIDsec 2008, pp\u00a0100\u2013113"},{"key":"407_CR16","unstructured":"IEEE (2000) IEEE standard 1363-2000: IEEE standard specifications for public-key cryptography. Available online at http:\/\/ieeexplore.ieee.org\/servlet\/opac?punumber=7168"},{"key":"407_CR17","unstructured":"International Organisation for Standardization (ISO) (1995) ISO\/IEC 7816-4: Information technology\u2014identification cards\u2014integrated circuit(s) cards with contacts\u2014Part\u00a04: Interindustry commands for interchange. Available online at http:\/\/www.iso.org"},{"key":"407_CR18","unstructured":"International Organisation for Standardization (ISO) (2003) ISO\/IEC 7810: Identification cards\u2014Physical characteristics"},{"key":"407_CR19","unstructured":"International Organization for Standardization (ISO) (2000) ISO\/IEC 14443: Identification cards\u2014Contactless integrated circuit(s) cards\u2014proximity cards"},{"key":"407_CR20","unstructured":"Kauer B (2007) Oslo: improving the security of trusted computing. In: SS\u201907: Proceedings of 16th USENIX security symposium, Berkeley, CA, USA, 2007. USENIX Association, pp\u00a01\u20139"},{"key":"407_CR21","doi-asserted-by":"crossref","unstructured":"K\u00fchn U, Selhorst M, St\u00fcble C (2007) Realizing property-based attestation and sealing with commonly available hard- and software. In STC \u201907: Proceedings of the 2007 ACM workshop on scalable trusted computing","DOI":"10.1145\/1314354.1314368"},{"key":"407_CR22","doi-asserted-by":"crossref","unstructured":"Li F, Wang W, Ma J, Ding Z (2008) Enhanced architecture of TPM. In: Young computer scientists, 2008. ICYCS 2008. The 9th international conference for, pp\u00a01532\u20131537","DOI":"10.1109\/ICYCS.2008.254"},{"key":"407_CR23","unstructured":"Lindner F (2007) Toying with barcodes. In: 24th chaos communication congress"},{"key":"407_CR24","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1109\/CSE.2009.213","volume-title":"Proceedings of the 2009 international conference on computational science and engineering","author":"J Lyle","year":"2009","unstructured":"Lyle J, Martin A (2009) On the feasibility of remote attestation for web services. In: Proceedings of the 2009 international conference on computational science and engineering, vol\u00a003. IEEE, New York, pp\u00a0283\u2013288"},{"key":"407_CR25","doi-asserted-by":"crossref","unstructured":"McCune J, Perrig A, Reiter M (2005) Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Security and privacy, 2005 IEEE symposium on, pp\u00a0110\u2013124","DOI":"10.1109\/SP.2005.19"},{"key":"407_CR26","doi-asserted-by":"crossref","unstructured":"McCune JM, Perrig A, Seshadri A, van Doorn L (August 2007) Turtles all the way down: Research challenges in user-based attestation. In: Proceedings of the workshop on hot topics in security (HotSec)","DOI":"10.1145\/1413901.1413903"},{"key":"407_CR27","unstructured":"NFC Forum (March 2007) NFC forum type 4 tag operation\u2014technical specification"},{"key":"407_CR28","unstructured":"OpenTC Project Consortium (2005\u20132009) The open trusted computing (OpenTC) project. http:\/\/www.opentc.net\/"},{"key":"407_CR29","unstructured":"Oprea A, Balfanz D, Durfee G, Smetters DK (2004) Securing a remote terminal application with a mobile trusted device. In: ACSAC"},{"key":"407_CR30","unstructured":"Parno B (2008) Bootstrapping trust in a \u201ctrusted\u201d platform. In: Proceedings of the 3rd conference on hot topics in security, San Jose, CA, 2008. USENIX Association, pp\u00a01\u20136"},{"key":"407_CR31","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-10868-6","volume-title":"Trust \u201909: Proceedings of the 2nd international conference on trusted computing","author":"M Pirker","year":"2009","unstructured":"Pirker M, Toegl R, Hein D, Danner P (2009) A\u00a0PrivacyCA for anonymity and trust. In: Chen L, Mitchell CJ, Andrew M (eds) Trust \u201909: Proceedings of the 2nd international conference on trusted computing. Lecture notes in computer science, vol\u00a05471. Springer, Berlin"},{"key":"407_CR32","first-page":"67","volume-title":"NSPW","author":"A-R Sadeghi","year":"2004","unstructured":"Sadeghi A-R, St\u00fcble C (2004) Property-based attestation for computing platforms: Caring about properties, not mechanisms. In: Hempelmann C, Raskin V (eds) NSPW. ACM, New York, pp\u00a067\u201377"},{"key":"407_CR33","unstructured":"Sailer R, Zhang X, Jaeger T, van Doorn L (2004) Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th conference on USENIX security symposium, vol\u00a013, San Diego, CA, 2004. USENIX Association, pp\u00a016\u201316"},{"key":"407_CR34","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1007\/11748625_15","volume-title":"Pervasive","author":"R Sharp","year":"2006","unstructured":"Sharp R, Scott J, Beresford AR (2006) Secure mobile computing via public terminals. In: Fishkin KP, Schiele B, Nixon P, Quigley AJ (eds) Pervasive. Lecture notes in computer science, vol\u00a03968. Springer, Berlin, pp\u00a0238\u2013253"},{"key":"407_CR35","unstructured":"Trusted Computing Group (2007) TCG software stack specification, version 1.2 errata a. https:\/\/www.trustedcomputinggroup.org\/specs\/TSS\/"},{"key":"407_CR36","unstructured":"Trusted Computing Group (2007) TCG TPM specification version 1.2 revision 103. https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0407-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-010-0407-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0407-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:24:00Z","timestamp":1559384640000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-010-0407-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,19]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,2]]}},"alternative-id":["407"],"URL":"https:\/\/doi.org\/10.1007\/s11227-010-0407-1","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,3,19]]}}}