{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:48:50Z","timestamp":1762004930197,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,18]],"date-time":"2017-07-18T00:00:00Z","timestamp":1500336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,18]]},"DOI":"10.1145\/3098243.3098258","type":"proceedings-article","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T20:03:43Z","timestamp":1499976223000},"page":"87-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Anonymous attestations made practical"],"prefix":"10.1145","author":[{"given":"Amira","family":"Barki","sequence":"first","affiliation":[{"name":"Trusted Labs, France"}]},{"given":"Nicolas","family":"Desmoulins","sequence":"additional","affiliation":[{"name":"Orange Labs, France"}]},{"given":"Sa\u00efd","family":"Gharout","sequence":"additional","affiliation":[{"name":"Orange Labs, France"}]},{"given":"Jacques","family":"Traor\u00e9","sequence":"additional","affiliation":[{"name":"Orange Labs, France"}]}],"member":"320","published-online":{"date-parts":[[2017,7,18]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1007\/11693383_22"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1007\/978-3-642-12510-2_15"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1007\/s00145-002-0120-1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1007\/s10207-013-0191-z"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.5555\/1754542.1754572"},{"volume-title":"CWI (Centre for Mathematics and Computer Science)","year":"1993","author":"Brands S. A.","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1030083.1030103"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/1314333.1314337"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.5555\/1875652.1875665"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1504\/IJIPSI.2011.043729"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1007\/978-3-319-45572-3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1007\/978-3-662-49387-8_10"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1016\/j.dam.2005.08.003"},{"key":"e_1_3_2_1_15_1","first-page":"350","volume-title":"Inscrypt","author":"Chen L.","year":"2009"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1007\/978-3-642-12510-2_16"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1007\/978-3-319-22846-4_14"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.4304\/jcp.3.12.43-50"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.5555\/1756169.1756211"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1007\/978-3-319-12280-9_18"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1007\/978-3-319-12280-9_14"},{"unstructured":"G. AlLee Intel. EPID for IoT Identity. https:\/\/img.en25.com\/Web\/McAfeeE10BuildProduction\/%7Ba6dd7393-63f8-4c08-b3aa-89923182a7e5%7D_EPID_Overview_Public_2016-02-08.pdf?elqTrackId=48387d7899274c7985c6ac808d6ecbac&elqaid=7811&elqat=2 2016.  G. AlLee Intel. EPID for IoT Identity. https:\/\/img.en25.com\/Web\/McAfeeE10BuildProduction\/%7Ba6dd7393-63f8-4c08-b3aa-89923182a7e5%7D_EPID_Overview_Public_2016-02-08.pdf?elqTrackId=48387d7899274c7985c6ac808d6ecbac&elqaid=7811&elqat=2 2016.","key":"e_1_3_2_1_22_1"},{"unstructured":"GSMA. SGP.01 Embedded SIM Remote Provisioning Architecture Technical Specification V3.1 2014.  GSMA. SGP.01 Embedded SIM Remote Provisioning Architecture Technical Specification V3.1 2014.","key":"e_1_3_2_1_23_1"},{"unstructured":"GSMA. SGP.02 Remote Provisioning Architecture for Embedded UICC Technical Specification V1.1 2016.  GSMA. SGP.02 Remote Provisioning Architecture for Embedded UICC Technical Specification V1.1 2016.","key":"e_1_3_2_1_24_1"},{"unstructured":"GSMA. SGP.21 RSP Architecture V2.0 2016.  GSMA. SGP.21 RSP Architecture V2.0 2016.","key":"e_1_3_2_1_25_1"},{"unstructured":"GSMA. SGP.22 Remote SIM Provisioning Technical Specification; Version 1.1 2016.  GSMA. SGP.22 Remote SIM Provisioning Technical Specification; Version 1.1 2016.","key":"e_1_3_2_1_26_1"},{"unstructured":"International Organization for Standardization. ISO\/IEC 20008--2: Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key 2013.  International Organization for Standardization. ISO\/IEC 20008--2: Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key 2013.","key":"e_1_3_2_1_27_1"},{"volume-title":"Springer International Publishing","year":"2015","author":"Lueks W.","key":"e_1_3_2_1_28_1"},{"volume-title":"SAC'99, 1999","year":"2000","author":"Lysyanskaya A.","key":"e_1_3_2_1_29_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1007\/11586821_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1007\/BF02113297"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1007\/978-3-319-29485-8_7"},{"doi-asserted-by":"crossref","unstructured":"V. Shoup. Advances in Cryptology --- EUROCRYPT '97: International Conference on the Theory and Application of Cryptographic Techniques Konstanz Germany May 11--15 1997 Proceedings chapter Lower Bounds for Discrete Logarithms and Related Problems pages 256--266. Springer Berlin Heidelberg 1997.   V. Shoup. Advances in Cryptology --- EUROCRYPT '97: International Conference on the Theory and Application of Cryptographic Techniques Konstanz Germany May 11--15 1997 Proceedings chapter Lower Bounds for Discrete Logarithms and Related Problems pages 256--266. Springer Berlin Heidelberg 1997.","key":"e_1_3_2_1_33_1","DOI":"10.1007\/3-540-69053-0_18"},{"unstructured":"Trusted Computing Group. TPM main specification (version 1.2) 2004. http:\/\/www.trustedcomputinggroup.org\/tpm-main-specification\/.  Trusted Computing Group. TPM main specification (version 1.2) 2004. http:\/\/www.trustedcomputinggroup.org\/tpm-main-specification\/.","key":"e_1_3_2_1_34_1"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","NSF National Science Foundation","ACM Association for Computing Machinery"],"acronym":"WiSec '17","name":"WiSec '17: 10th ACM Conference on Security & Privacy in Wireless and Mobile Networks","location":"Boston Massachusetts"},"container-title":["Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098243.3098258","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3098243.3098258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:03Z","timestamp":1750217403000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098243.3098258"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,18]]},"references-count":33,"alternative-id":["10.1145\/3098243.3098258","10.1145\/3098243"],"URL":"https:\/\/doi.org\/10.1145\/3098243.3098258","relation":{},"subject":[],"published":{"date-parts":[[2017,7,18]]},"assertion":[{"value":"2017-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}