{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T23:05:23Z","timestamp":1747868723211},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/iccd.2010.5647705","type":"proceedings-article","created":{"date-parts":[[2010,12,9]],"date-time":"2010-12-09T15:42:09Z","timestamp":1291909329000},"page":"350-355","source":"Crossref","is-referenced-by-count":5,"title":["Feasibility study of dynamic Trusted Platform Module"],"prefix":"10.1109","author":[{"given":"Arun K.","family":"Kanuparthi","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Zahran","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"HP Interactive CACTI","year":"0","key":"15"},{"journal-title":"Valgrind Exp-bbv - Basic Block Vector Generation Tool","year":"0","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2009.4919638"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2005.1430554"},{"key":"12","article-title":"Stream: Sustainable memory bandwidth in high performance computers","author":"mccalpin","year":"1991","journal-title":"University of Virginia Technical Report"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1987.1676899"},{"key":"2","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/978-3-540-68979-9_2","article-title":"TOCTOU, traps, and trusted computing","author":"bratus","year":"2008","journal-title":"Proceedings of the 1st International Conference on Trusted Computing and Trust in Information Technologies Trusted Computing - Challenges and Applications"},{"journal-title":"Trusted Platform Module (TPM) Summary","year":"2008","key":"1"},{"journal-title":"Computer Architecture - A Quantitative Approach","year":"2007","author":"hennessey","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2004.1413018"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2004.1347961"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2003.1183547"},{"key":"4","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1007\/11427995_54","article-title":"CODESSEAL: Compiler\/FPGA approach to secure applications","author":"gelbart","year":"2005","journal-title":"IEEE Int Conf Intelligence and Security Informatics"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.1997.645805"},{"key":"8","article-title":"Architecture support for dynamic trust measurement","author":"kanuparthi","year":"2010","journal-title":"Polytechnic Institute of NYU Tech Rep"}],"event":{"name":"2010 IEEE International Conference on Computer Design (ICCD 2010)","start":{"date-parts":[[2010,10,3]]},"location":"Amsterdam, Netherlands","end":{"date-parts":[[2010,10,6]]}},"container-title":["2010 IEEE International Conference on Computer Design"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5640356\/5647518\/05647705.pdf?arnumber=5647705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T17:03:12Z","timestamp":1497891792000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5647705\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iccd.2010.5647705","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}