{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:34:54Z","timestamp":1729636494041,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/uic-atc-scalcom.2014.30","type":"proceedings-article","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T22:13:20Z","timestamp":1445897600000},"page":"590-595","source":"Crossref","is-referenced-by-count":2,"title":["An Anonymous Remote Attestation Protocol to Prevent Masquerading Attack"],"prefix":"10.1109","author":[{"given":"Anna","family":"Lan","sequence":"first","affiliation":[]},{"given":"Zhen","family":"Han","sequence":"additional","affiliation":[]},{"given":"Dawei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yichen","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Tianhua","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Meihong","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-009-0076-3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_16"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-642-13869-0_12","article-title":"A pairing-based DAA scheme further reducing TPM resources [M]","author":"brickell","year":"2010","journal-title":"Trust and Trustworthy Computing"},{"key":"ref13","first-page":"350","article-title":"DAA scheme requiring less TPM re-sources[C]","author":"chen","year":"2011","journal-title":"Information Security and Cryptology"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/2508859.2516729","article-title":"Flexible and scalable digital signatures in TPM 2.0[C]","author":"chen","year":"2013","journal-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25283-9_8"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13241-4_24"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.17487\/rfc4492","article-title":"Elliptic curve cryptography (ECC) cipher suites for transport layer security (TLS)[J]","author":"blake-wilson","year":"2006"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref19","first-page":"218","article-title":"Direct Anonymous Attestation (DAA): Ensuring privacy with corrupt administrators[M]","author":"smyth","year":"2007"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.138"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1179474.1179481"},{"key":"ref5","first-page":"25","article-title":"A robust integrity reporting protocol for remote attestation[C]","author":"stumpf","year":"2006","journal-title":"Second Workshop on Advances in Trusted Computing"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1456455.1456462"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1314354.1314363"},{"volume":"0","journal-title":"Trusted Computing Group TCG TPM Specification","year":"2012","key":"ref2"},{"key":"ref1","article-title":"TCG Specification Architecture Overview Revision 1.4[J]","volume":"10","author":"grawrock","year":"2007"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.3.12.43-50"}],"event":{"name":"2014 IEEE 11th Intl Conf on Ubiquitous Intelligence & Computing and 2014 IEEE 11th Intl Conf on Autonomic & Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)","start":{"date-parts":[[2014,12,9]]},"location":"Bali, Indonesia","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7306109\/7306779\/07307009.pdf?arnumber=7307009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T22:15:31Z","timestamp":1498256131000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7307009\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/uic-atc-scalcom.2014.30","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}