{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:31Z","timestamp":1750307491384,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,24]],"date-time":"2010-10-24T00:00:00Z","timestamp":1287878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,24]]},"DOI":"10.1145\/1873548.1873559","type":"proceedings-article","created":{"date-parts":[[2010,11,1]],"date-time":"2010-11-01T13:32:23Z","timestamp":1288618343000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure protocols for serverless remote product authentication"],"prefix":"10.1145","author":[{"given":"Abdourhamane","family":"Idrissa","sequence":"first","affiliation":[{"name":"Universite de Lyon, Lyon, France and Universite de Saint-Etienne, Saint-Etienne, France"}]},{"given":"Alain","family":"Aubert","sequence":"additional","affiliation":[{"name":"Universite de Lyon, Lyon, France and Universite de Saint-Etienne, Saint-Etienne, France"}]},{"given":"Thierry","family":"Fournel","sequence":"additional","affiliation":[{"name":"Universite de Lyon, Lyon, France and Universite de Saint-Etienne, Saint-Etienne, France"}]},{"given":"Viktor","family":"Fischer","sequence":"additional","affiliation":[{"name":"Universite de Lyon, Lyon, France and Universite de Saint-Etienne, Saint-Etienne, France"}]}],"member":"320","published-online":{"date-parts":[[2010,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_9"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278484"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1788634.1788646"},{"key":"e_1_3_2_1_4_1","volume-title":"Remote Object Authentication: confidence model, cryptosystem and protocol,\" in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series","author":"Lancrenon J.","year":"2009","unstructured":"J. Lancrenon , R. Gillard , and T. Fournel , \" Remote Object Authentication: confidence model, cryptosystem and protocol,\" in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series , vol. 7344 , 2009 . J. Lancrenon, R. Gillard, and T. Fournel, \"Remote Object Authentication: confidence model, cryptosystem and protocol,\" in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, vol. 7344, 2009."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948131"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/206\/1\/012036"},{"key":"e_1_3_2_1_7_1","unstructured":"D. Kravitz \"Digital signature algorithm \" Jul. 27 1993 US Patent 5 231 668.  D. Kravitz \"Digital signature algorithm \" Jul. 27 1993 US Patent 5 231 668."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1981.32"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_38"},{"key":"e_1_3_2_1_10_1","volume-title":"Ecole Normale Superieure","author":"Blanchet B.","year":"2005","unstructured":"B. Blanchet , \"ProVerif automatic cryptographic protocol verifier user manual,\" CNRS, Departement dInformatique , Ecole Normale Superieure , Paris , 2005 . B. Blanchet, \"ProVerif automatic cryptographic protocol verifier user manual,\" CNRS, Departement dInformatique, Ecole Normale Superieure, Paris, 2005."}],"event":{"name":"ESWeek '10: Sixth Embedded Systems Week","sponsor":["CEDA Council on Electronic Design Automation","SIGBED ACM Special Interest Group on Embedded Systems","SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","IEEE CS"],"location":"Scottsdale Arizona","acronym":"ESWeek '10"},"container-title":["Proceedings of the 5th Workshop on Embedded Systems Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1873548.1873559","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1873548.1873559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:33Z","timestamp":1750249053000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1873548.1873559"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,24]]},"references-count":10,"alternative-id":["10.1145\/1873548.1873559","10.1145\/1873548"],"URL":"https:\/\/doi.org\/10.1145\/1873548.1873559","relation":{},"subject":[],"published":{"date-parts":[[2010,10,24]]},"assertion":[{"value":"2010-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}