{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T21:09:36Z","timestamp":1761772176332,"version":"build-2065373602"},"reference-count":13,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2013,7,16]],"date-time":"2013-07-16T00:00:00Z","timestamp":1373932800000},"content-version":"vor","delay-in-days":196,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2013]]},"DOI":"10.1016\/j.procs.2013.06.160","type":"journal-article","created":{"date-parts":[[2013,6,25]],"date-time":"2013-06-25T06:08:07Z","timestamp":1372140487000},"page":"1130-1135","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Device-based Isolation for Securing Cryptographic Keys"],"prefix":"10.1016","volume":"19","author":[{"given":"Karim O.","family":"Elish","sequence":"first","affiliation":[]},{"given":"Yipan","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Danfeng (Daphne)","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Dennis","family":"Kafura","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2013.06.160_bib0005","doi-asserted-by":"crossref","unstructured":"F. Cohen, Computer viruses theory and experiments, Computers and Security 6 (1987) 22-35.","DOI":"10.1016\/0167-4048(87)90122-2"},{"key":"10.1016\/j.procs.2013.06.160_bib0010","unstructured":"K. Borders, E.V. Weele, B. Lau, A. Prakash, Protecting confidential data on personal computers with storage capsules, in: 18th USENIX Security Symposium, 2009, pp. 367-382."},{"key":"10.1016\/j.procs.2013.06.160_bib0015","doi-asserted-by":"crossref","unstructured":"S. Garriss, R. C\u00e1ceres, S. Berger, R. Sailer, L. van Doorn, X. Zhang, Trustworthy and personalized computing on public kiosks, in: Proc. of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys), 2008, pp. 199-210.","DOI":"10.1145\/1378600.1378623"},{"key":"10.1016\/j.procs.2013.06.160_bib0020","unstructured":"K. O. Elish, Y. Deng, D. Yao, D. Kafura, Device-based isolation for securing cryptographic keys, Technical Report TR-12-21, Virginia Tech (2012)."},{"key":"10.1016\/j.procs.2013.06.160_bib0025","unstructured":"J. M. McCune, A. Perrig, M.K. Reiter, Bump in the ether: A framework for securing sensitive user input, in: USENIX Annual Technical Conference, General Track, 2006, pp. 185-198."},{"key":"10.1016\/j.procs.2013.06.160_bib0030","unstructured":"J. M. McCune, A. Perrig, M.K. Reiter, Safe passage for passwords and other sensitive data, in: Proc. of the Network and Distributed System Security Symposium (NDSS), 2009."},{"key":"10.1016\/j.procs.2013.06.160_bib0035","doi-asserted-by":"crossref","unstructured":"J. Zic, S. Nepal, Implementing a portable trusted environment, in: Future of Trust in Computing, 2009, pp. 17-29.","DOI":"10.1007\/978-3-8348-9324-6_2"},{"key":"10.1016\/j.procs.2013.06.160_bib0040","doi-asserted-by":"crossref","unstructured":"S. Nepal, J. Zic, D. Liu, J. Jang, A mobile and portable trusted computing platform, EURASIP Journal on Wireless Communica- tions and Networking 75 (2011) 1-19.","DOI":"10.1186\/1687-1499-2011-75"},{"key":"10.1016\/j.procs.2013.06.160_bib0045","doi-asserted-by":"crossref","unstructured":"M. Mannan, P.C. van Oorschot, Using a personal device to strengthen password authentication from an untrusted computer, in: 11th International Conference on Financial Cryptography and Data Security, and 1st International Workshop on Usable Security, 2007, pp. 88-103.","DOI":"10.1007\/978-3-540-77366-5_11"},{"key":"10.1016\/j.procs.2013.06.160_bib0050","doi-asserted-by":"crossref","unstructured":"G. Starnberger, L. Froihofer, K.M. G\u00f6schka, QRTAN: Secure mobile transaction authentication, in: Proc. of the 4th International Conference on Availability, Reliability and Security (ARES), 2009, pp. 578-583.","DOI":"10.1109\/ARES.2009.96"},{"key":"10.1016\/j.procs.2013.06.160_bib0055","doi-asserted-by":"crossref","unstructured":"A. Oprea, D. Balfanz, G. Durfee, D.K. Smetters, Securing a remote terminal application with a mobile trusted device, in: 20th Annual Computer Security Applications Conference (ACSAC), 2004, pp. 438-447.","DOI":"10.1109\/CSAC.2004.33"},{"key":"10.1016\/j.procs.2013.06.160_bib0060","doi-asserted-by":"crossref","unstructured":"Y.-Y. Chen, C.-L. Chen, J.-K. Jan, A mobile ticket system based on personal trusted device, Wireless Personal Communications: An International Journal 40 (2007) 569-578.","DOI":"10.1007\/s11277-006-9122-x"},{"key":"10.1016\/j.procs.2013.06.160_bib0065","doi-asserted-by":"crossref","unstructured":"R. Sharp, A. Madhavapeddy, R. Want, T. Pering, Enhancing web browsing security on public terminals using mobile composition, in: Proc. of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys), 2008, pp. 94-105.","DOI":"10.1145\/1378600.1378612"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050913007680?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050913007680?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T21:06:46Z","timestamp":1761772006000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050913007680"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"references-count":13,"alternative-id":["S1877050913007680"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2013.06.160","relation":{},"ISSN":["1877-0509"],"issn-type":[{"type":"print","value":"1877-0509"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Device-based Isolation for Securing Cryptographic Keys","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2013.06.160","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2013 The Authors. Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}