{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:11:48Z","timestamp":1763467908031,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,10]],"date-time":"2009-03-10T00:00:00Z","timestamp":1236643200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,10]]},"DOI":"10.1145\/1533057.1533074","type":"proceedings-article","created":{"date-parts":[[2009,4,28]],"date-time":"2009-04-28T14:57:19Z","timestamp":1240930639000},"page":"104-115","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":63,"title":["On-board credentials with open provisioning"],"prefix":"10.1145","author":[{"given":"Kari","family":"Kostiainen","sequence":"first","affiliation":[{"name":"Nokia Research Center, Helsinki, Finland"}]},{"given":"Jan-Erik","family":"Ekberg","sequence":"additional","affiliation":[{"name":"Nokia Research Center, Helsinki, Finland"}]},{"given":"N.","family":"Asokan","sequence":"additional","affiliation":[{"name":"Nokia Research Center, Helsinki, Finland"}]},{"given":"Aarne","family":"Rantala","sequence":"additional","affiliation":[{"name":"Technical Research Center, Espoo, Finland"}]}],"member":"320","published-online":{"date-parts":[[2009,3,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ARM. Trustzone-enabled processor. http:\/\/www.arm.com\/pdfs\/DDI0301D_arm1176jzfs_r0p2_trm.pdf.  ARM. Trustzone-enabled processor. http:\/\/www.arm.com\/pdfs\/DDI0301D_arm1176jzfs_r0p2_trm.pdf."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85893-5_10"},{"key":"e_1_3_2_1_3_1","volume-title":"Dynamic symmetric key provisioning protocol (dskpp). IETF Internet Draft, version","author":"A. Doherty","year":"2008","unstructured":"A. Doherty et al. Dynamic symmetric key provisioning protocol (dskpp). IETF Internet Draft, version 06, November 2008 . http:\/\/tools.ietf.org\/html\/ draft-ietf-keyprov-dskpp-06. A. Doherty et al. Dynamic symmetric key provisioning protocol (dskpp). IETF Internet Draft, version 06, November 2008. http:\/\/tools.ietf.org\/html\/ draft-ietf-keyprov-dskpp-06."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315294"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456455.1456465"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.59"},{"volume-title":"August","year":"2007","key":"e_1_3_2_1_9_1","unstructured":"GlobalPlatform. Why the mobile industry is evolving towards security , August 2007 . GlobalPlatform white paper. http:\/\/www.globalplatform.org\/uploads\/ STIP _WhitePaper.pdf. GlobalPlatform. Why the mobile industry is evolving towards security, August 2007. GlobalPlatform white paper. http:\/\/www.globalplatform.org\/uploads\/ STIP_WhitePaper.pdf."},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. Usenix Security Symposium","author":"Alex","year":"2008","unstructured":"Alex Halderman et al. Lest we remember: Cold boot attacks on encryption keys . In Proc. Usenix Security Symposium , 2008 . http:\/\/citp.princeton.edu\/memory\/. Alex Halderman et al. Lest we remember: Cold boot attacks on encryption keys. In Proc. Usenix Security Symposium, 2008. http:\/\/citp.princeton.edu\/memory\/."},{"key":"e_1_3_2_1_11_1","unstructured":"JavaCard Technology. http:\/\/java.sun.com\/products\/javacard\/.  JavaCard Technology. http:\/\/java.sun.com\/products\/javacard\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.14"},{"key":"e_1_3_2_1_13_1","unstructured":"The Programming Language Lua. http:\/\/www.lua.org\/.  The Programming Language Lua. http:\/\/www.lua.org\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.27"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","DOI":"10.17487\/rfc4758","volume-title":"Cryptographic Token Key Initialization Protocol (CT-KIP). IETF RFC","author":"Nystr\u00f6m Magnus","year":"2006","unstructured":"Magnus Nystr\u00f6m . Cryptographic Token Key Initialization Protocol (CT-KIP). IETF RFC 4758, November 2006 . Magnus Nystr\u00f6m. Cryptographic Token Key Initialization Protocol (CT-KIP). IETF RFC 4758, November 2006."},{"key":"e_1_3_2_1_16_1","unstructured":"Open Mobile Alliance - Device Management Working Group. http:\/\/www.openmobilealliance.org\/Technical\/DM.aspx.  Open Mobile Alliance - Device Management Working Group. http:\/\/www.openmobilealliance.org\/Technical\/DM.aspx."},{"key":"e_1_3_2_1_17_1","volume-title":"M-Shield mobile security technology","author":"Srage Jay","year":"2005","unstructured":"Jay Srage and J\u00e9r\u00f4me Azema . M-Shield mobile security technology , 2005 . TI White paper. http:\/\/focus.ti.com\/pdfs\/wtbu\/ti_mshield_whitepaper.pdf. Jay Srage and J\u00e9r\u00f4me Azema. M-Shield mobile security technology, 2005. TI White paper. http:\/\/focus.ti.com\/pdfs\/wtbu\/ti_mshield_whitepaper.pdf."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.22"},{"key":"e_1_3_2_1_19_1","volume-title":"Specification Version 1.0 Revision","author":"Infrastructure Workgroup TCG","year":"2005","unstructured":"TCG Infrastructure Workgroup . Subject Key Attestation Evidence Extension \", Specification Version 1.0 Revision 7, June 2005 . https:\/\/www.trustedcomputinggroup.org\/specs\/IWG\/. TCG Infrastructure Workgroup. Subject Key Attestation Evidence Extension\", Specification Version 1.0 Revision 7, June 2005. https:\/\/www.trustedcomputinggroup.org\/specs\/IWG\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Trusted Platform Module (TPM) Specifications. https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/.  Trusted Platform Module (TPM) Specifications. https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/."},{"key":"e_1_3_2_1_21_1","volume-title":"April","author":"Forum MAX","year":"2008","unstructured":"Wi MAX Forum . Wi MAX Forum X. 509 Device Certificate Profile Approved Specification , April 2008 . http:\/\/www.wimaxforum.org\/certification\/x509_ certificates\/pdfs\/wimax_forum_x509_device_certificate_profile.pdf. WiMAX Forum. WiMAX Forum X. 509 Device Certificate Profile Approved Specification, April 2008. http:\/\/www.wimaxforum.org\/certification\/x509_ certificates\/pdfs\/wimax_forum_x509_device_certificate_profile.pdf."}],"event":{"name":"Asia CCS 09: Asia CCS 2009 ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Sydney Australia","acronym":"Asia CCS 09"},"container-title":["Proceedings of the 4th International Symposium on Information, Computer, and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1533057.1533074","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1533057.1533074","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:44Z","timestamp":1750253384000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1533057.1533074"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,10]]},"references-count":19,"alternative-id":["10.1145\/1533057.1533074","10.1145\/1533057"],"URL":"https:\/\/doi.org\/10.1145\/1533057.1533074","relation":{},"subject":[],"published":{"date-parts":[[2009,3,10]]},"assertion":[{"value":"2009-03-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}