{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:56:05Z","timestamp":1762005365959,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Commission - Horizon 2020","award":["871403"],"award-info":[{"award-number":["871403"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,17]]},"DOI":"10.1145\/3465481.3470063","type":"proceedings-article","created":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T17:57:21Z","timestamp":1629136641000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Managing Anonymous Keys in a Fog-Computing Platform"],"prefix":"10.1145","author":[{"given":"Raphael","family":"Schermann","sequence":"first","affiliation":[{"name":"Infineon Technologies Austria AG, AT"}]},{"given":"Ronald","family":"Toegl","sequence":"additional","affiliation":[{"name":"Infineon Technologies Austria AG, AT"}]},{"given":"Christian","family":"Steger","sequence":"additional","affiliation":[{"name":"Institute for Technical Informatics, Graz University of Technology, AT"}]}],"member":"320","published-online":{"date-parts":[[2021,8,17]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Fog Computing: Theory and Practice","author":"Abbas Assad","year":"2020","unstructured":"Assad Abbas, Samee\u00a0U. Khan, and Albert\u00a0Y. Zomays. 2020. Fog Computing: Theory and Practice. John Wiley & Sons, Inc. 1\u2013608 pages."},{"key":"e_1_3_2_2_2_1","volume-title":"What is fog computing?https:\/\/www.ibm.com\/blogs\/cloud-computing\/2014\/08\/25\/fog-computing\/. [Online","author":"Banafa Ahmed","year":"2021","unstructured":"Ahmed Banafa. 2014. What is fog computing?https:\/\/www.ibm.com\/blogs\/cloud-computing\/2014\/08\/25\/fog-computing\/. [Online; accessed 04-May-2021]."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.145"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6584-9"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"e_1_3_2_2_8_1","volume-title":"https:\/\/github.com\/cjdelisle\/cjdns\/blob\/master\/doc\/Whitepaper.md. [Online","author":"DeLisle Caleb James","year":"2021","unstructured":"Caleb James DeLisle. 2019. CJDNS - Whitepaper. https:\/\/github.com\/cjdelisle\/cjdns\/blob\/master\/doc\/Whitepaper.md. [Online; accessed 28-April-2021]."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119525080.ch1"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516729"},{"key":"e_1_3_2_2_11_1","volume-title":"Top Threats to Cloud Computing - The Egregious 11. https:\/\/cloudsecurityalliance.org\/artifacts\/top-threats-to-cloud-computing-egregious-eleven\/. [Online","author":"CSA.","year":"2021","unstructured":"CSA. 2019. Top Threats to Cloud Computing - The Egregious 11. https:\/\/cloudsecurityalliance.org\/artifacts\/top-threats-to-cloud-computing-egregious-eleven\/. [Online; accessed 03-May-2021]."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"e_1_3_2_2_14_1","first-page":"5","article-title":"La cryptographie militaire","author":"Kerckhoffs Auguste","year":"1883","unstructured":"Auguste Kerckhoffs. 1883. La cryptographie militaire. Journal des sciences militaires IX (1883), 5\u201338.","journal-title":"Journal des sciences militaires"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2749422"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.158"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005098204050410"},{"volume-title":"A PrivacyCA for Anonymity and Trust","author":"Pirker Martin","key":"e_1_3_2_2_18_1","unstructured":"Martin Pirker, Ronald Toegl, Daniel Hein, and Peter Danner. 2009. A PrivacyCA for Anonymity and Trust. In Trusted Computing, Liqun Chen, Chris\u00a0J. Mitchell, and Andrew Martin (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 101\u2013119."},{"volume-title":"Trusted Computing Platforms","author":"Proudler Graeme","key":"e_1_3_2_2_19_1","unstructured":"Graeme Proudler, Liqun Chen, and Chris Dalton. 2015. Trusted Computing Platforms. Springer-Verlag GmbH. https:\/\/www.ebook.de\/de\/product\/25038488\/graeme_proudler_liqun_chen_chris_dalton_trusted_computing_platforms.html"},{"key":"e_1_3_2_2_20_1","volume-title":"What Edge Computing Means for Infrastructure and Operations Leaders. https:\/\/www.gartner.com\/smarterwithgartner\/what-edge-computing-means-for-infrastructure-and-operations-leaders. [Online","author":"van der Meulen Rob","year":"2021","unstructured":"Rob van der Meulen. 2018. What Edge Computing Means for Infrastructure and Operations Leaders. https:\/\/www.gartner.com\/smarterwithgartner\/what-edge-computing-means-for-infrastructure-and-operations-leaders. [Online; accessed 01-May-2021]."},{"key":"e_1_3_2_2_21_1","first-page":"0","article-title":"Source code for","volume":"2","author":"SCCS.","year":"2019","unstructured":"SCCS. 2019. Source code for \u201dFormal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme\u201d. https:\/\/github.com\/UoS-SCCS\/ecc-daa. [Online; accessed 28-April-2021].","journal-title":"Formal Analysis and Implementation of a TPM"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2016.2579198"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3372197"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2017.8275615"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.008"}],"event":{"name":"ARES 2021: The 16th International Conference on Availability, Reliability and Security","acronym":"ARES 2021","location":"Vienna Austria"},"container-title":["Proceedings of the 16th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3470063","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3465481.3470063","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:24Z","timestamp":1750191444000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3470063"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":23,"alternative-id":["10.1145\/3465481.3470063","10.1145\/3465481"],"URL":"https:\/\/doi.org\/10.1145\/3465481.3470063","relation":{},"subject":[],"published":{"date-parts":[[2021,8,17]]},"assertion":[{"value":"2021-08-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}