{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T11:16:34Z","timestamp":1672485394720},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,8,25]],"date-time":"2011-08-25T00:00:00Z","timestamp":1314230400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1186\/1687-1499-2011-75","type":"journal-article","created":{"date-parts":[[2011,8,25]],"date-time":"2011-08-25T18:16:55Z","timestamp":1314296215000},"source":"Crossref","is-referenced-by-count":15,"title":["A mobile and portable trusted computing platform"],"prefix":"10.1186","volume":"2011","author":[{"given":"Surya","family":"Nepal","sequence":"first","affiliation":[]},{"given":"John","family":"Zic","sequence":"additional","affiliation":[]},{"given":"Dongxi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Julian","family":"Jang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,25]]},"reference":[{"key":"74_CR1","volume-title":"Understanding SOA with Web Services (Independent Technology Guides)","author":"E Newcomer","year":"2004","unstructured":"Newcomer E, Lomow G: Understanding SOA with Web Services (Independent Technology Guides). Addison-Wesley Professional; 2004."},{"key":"74_CR2","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1032222.1032225","volume-title":"Proceedings of the 12th annual ACM International Workshop on Geographic Information Systems, ser. GIS","author":"N WeiBenberg","year":"2004","unstructured":"WeiBenberg N, Voisard A, Gartmann R: Using ontologies in personalized mobile applications. In Proceedings of the 12th annual ACM International Workshop on Geographic Information Systems, ser. GIS. ACM, New York; 2004:2-11."},{"key":"74_CR3","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1145\/1085777.1085803","volume-title":"Proceedings of the 7th International Conference on Human Computer Interaction with Mobile Devices & Services, ser. MobileHCI","author":"D Raptis","year":"2005","unstructured":"Raptis D, Tselios N, Avouris N: Context-based design of mobile applications for museums: a survey of existing practices. In Proceedings of the 7th International Conference on Human Computer Interaction with Mobile Devices & Services, ser. MobileHCI. ACM, New York; 2005:153-160."},{"key":"74_CR4","first-page":"414","volume-title":"IEEE Symposium on Security and Privacy","author":"B Parno","year":"2010","unstructured":"Parno B, McCune JM, Perrig A: Bootstrapping trust in commodity computers. IEEE Symposium on Security and Privacy 2010, 414-429."},{"key":"74_CR5","doi-asserted-by":"publisher","first-page":"1449","DOI":"10.1145\/1774088.1774399","volume-title":"Proceedings of the 2010 ACM Symposium on Applied Computing, ser. SAC","author":"D O'Callaghan","year":"2010","unstructured":"O'Callaghan D, Doran L, Coghlan B: Evaluating trust in grid certificates. In Proceedings of the 2010 ACM Symposium on Applied Computing, ser. SAC. ACM, New York; 2010:1449-1450."},{"key":"74_CR6","volume-title":"Digital Certificates: Applied Internet Security (with CD-ROM)","author":"J Feghhi","year":"1998","unstructured":"Feghhi J, Williams P: Digital Certificates: Applied Internet Security (with CD-ROM). Addison-Wesley Longman Publishing Co., Inc., Boston, MA; 1998."},{"key":"74_CR7","first-page":"4680","volume-title":"Proceedings of the 28th IEEE Conference on Global Telecommunications, ser. GLOBECOM'09","author":"T AbuHmed","year":"2009","unstructured":"AbuHmed T, Nyamaa N, Nyang D: Software-based remote code attestation in wireless sensor network. Proceedings of the 28th IEEE Conference on Global Telecommunications, ser. GLOBECOM'09 IEEE Press, Piscataway, NJ; 2009, 4680-4687. [\n                    http:\/\/portal.acm.org\/citation.cfm?id=1811982.1812159\n                    \n                  ]"},{"key":"74_CR8","unstructured":"Trusted Computing Group[\n                    http:\/\/www.trustedcomputinggroup.org\/\n                    \n                  ]"},{"key":"74_CR9","unstructured":"IronKey[\n                    https:\/\/www.ironkey.com\/\n                    \n                  ]"},{"key":"74_CR10","unstructured":"Encryptakey[\n                    http:\/\/investing.businessweek.com\/research\/stocks\/private\/snapshot.asp?privcapId=13189536\n                    \n                  ]"},{"key":"74_CR11","volume-title":"Microsoft white paper on trustworthy computing","author":"C Mundie","year":"2002","unstructured":"Mundie C, de Vries P, Haynes P, Corwine M: Microsoft white paper on trustworthy computing. Microsoft Corporation; 2002."},{"key":"74_CR12","volume-title":"15th IST Mobile and Wireless Communication Summit","author":"FC Bormann","year":"2006","unstructured":"Bormann FC, Manteau L, Linke A, Pailles JC, van Dijk J: Concept for trusted personal devices in a mobile and networked environment. 15th IST Mobile and Wireless Communication Summit 2006."},{"issue":"12","key":"74_CR13","doi-asserted-by":"publisher","first-page":"1605","DOI":"10.1002\/wcm.1059","volume":"10","author":"U Kumar","year":"2010","unstructured":"Kumar U, Thakur GS, Helmy A: Proximity based trust-advisor using encounters for mobile societies: analysis of four filters. Wirel Commun Mobile Comput 2010, 10(12):1605-1619. 10.1002\/wcm.1059","journal-title":"Wirel Commun Mobile Comput"},{"key":"74_CR14","unstructured":"TCG Trusted Platform Module (TPM) Specification[\n                    https:\/\/www.trustedcomputinggroup.org\/specs\/tpm\/\n                    \n                  ]"},{"key":"74_CR15","unstructured":"Trusted Computing Platform Alliance (TCPA), Main specification, version 1.1b 2002."},{"key":"74_CR16","unstructured":"Trusted Computing Group, Main specification, version 1.2 revision no. 1032010. [\n                    http:\/\/www.trustedcomputinggroup.org\/resources\/tpm\n                    \n                  ]"},{"issue":"5","key":"74_CR17","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MSP.2007.127","volume":"5","author":"V Gratzer","year":"2007","unstructured":"Gratzer V, Naccache D: Trust on a nationwide scale. IEEE Security Privacy 2007, 5(5):69-71.","journal-title":"IEEE Security Privacy"},{"key":"74_CR18","unstructured":"Gemalto[\n                    http:\/\/www.gemalto.com\n                    \n                  ]"},{"key":"74_CR19","first-page":"16","volume-title":"Proceedings of the 13th Conference on USENIX Security Symposium!","author":"R Sailer","year":"2004","unstructured":"Sailer R, Zhang X, Jaeger T, van Doorn L: Design and implementation of a tcg-based integrity measurement architecture. Proceedings of the 13th Conference on USENIX Security Symposium! 2004, 16-16."},{"issue":"4","key":"74_CR20","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s00779-009-0235-6","volume":"14","author":"D Moreland","year":"2010","unstructured":"Moreland D, Nepal S, Hwang H, Zic J: A snapshot of trusted personal devices applicable to transaction processing. Personal Ubiquitous Comput 2010, 14(4):347-361. 10.1007\/s00779-009-0235-6","journal-title":"Personal Ubiquitous Comput"},{"key":"74_CR21","volume-title":"Smart Card Handbook","author":"W Rankl","year":"1997","unstructured":"Rankl W, Effing W: Smart Card Handbook. 1st edition. John Wiley & Sons, Inc., New York; 1997.","edition":"1"},{"key":"74_CR22","doi-asserted-by":"publisher","first-page":"2234","DOI":"10.1016\/j.comnet.2007.01.009","volume":"51","author":"HK Lu","year":"2007","unstructured":"Lu HK: Network smart card review and analysis. Comput Netw 2007, 51: 2234-2248. [\n                    http:\/\/portal.acm.org\/citation.cfm?id=1241112.1241372\n                    \n                  ] 10.1016\/j.comnet.2007.01.009","journal-title":"Comput Netw"},{"key":"74_CR23","first-page":"193","volume-title":"Smart Card Research and Advanced Applications VI, ser. IFIP International Federation for Information Processing","author":"M Montgomery","year":"2004","unstructured":"Montgomery M, Ali A, Lu K: Secure network card. In Smart Card Research and Advanced Applications VI, ser. IFIP International Federation for Information Processing. Volume 153. Edited by: Quisquater J-J, Paradinas P, Deswarte Y, El Kalam A. Springer, Boston, MA; 2004:193-208."},{"issue":"17","key":"74_CR24","doi-asserted-by":"publisher","first-page":"1655","DOI":"10.1016\/S0140-3664(00)00252-8","volume":"23","author":"P Urien","year":"2000","unstructured":"Urien P: Internet card, a smart card as a true internet node. Comput Commun 2000, 23(17):1655-1666. [\n                    http:\/\/www.sciencedirect.com\/science\/article\/B6TYP-41ST54T-B\/2\/24adee584b18afe9416b17576794292a\n                    \n                  ] 10.1016\/S0140-3664(00)00252-8","journal-title":"Comput Commun"},{"key":"74_CR25","first-page":"197","volume-title":"Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications on Smart Card Research and Advanced Applications","author":"J Rees","year":"2001","unstructured":"Rees J, Honeyman P: Webcard: a java card web server. Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications on Smart Card Research and Advanced Applications Kluwer Academic Publishers, Norwell, MA; 2001, 197-207. [\n                    http:\/\/portal.acm.org\/citation.cfm?id=366214.366282\n                    \n                  ]"},{"issue":"2","key":"74_CR26","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2010.56","volume":"8","author":"HK Lu","year":"2010","unstructured":"Lu HK, Ali AM: Making smart cards truly portable. IEEE Security Privacy 2010, 8(2):28-34.","journal-title":"IEEE Security Privacy"},{"key":"74_CR27","first-page":"818","volume-title":"Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, ser. CCNC'09","author":"HK Lu","year":"2009","unstructured":"Lu HK, Ali AM, Durand S, Castillo L: A new secure communication framework for smart cards. In Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, ser. CCNC'09. IEEE Press; 2009:818-822."},{"key":"74_CR28","first-page":"48","volume-title":"DPM\/SETOP","author":"Y Deswarte","year":"2009","unstructured":"Deswarte Y, Gambs S: Towards a privacy-preserving national identity card. DPM\/SETOP 2009, 48-64."},{"key":"74_CR29","unstructured":"Ministry of Home Affairs Singapore In the 15th annual governmentware securing intelligent enterprises (GovWare'i06). Singapore; 2006."},{"key":"74_CR30","first-page":"253","volume-title":"OTM Conferences (1)","author":"S Nepal","year":"2007","unstructured":"Nepal S, Zic J, Hwang H, Moreland D: Trust extension device: providing mobility and portability of trust in cooperative information systems. OTM Conferences (1) 2007, 253-271."},{"key":"74_CR31","volume-title":"IETF request for comments: 4949","author":"RW Shirey","year":"2007","unstructured":"Shirey RW: Internet security glossary, version 2. IETF request for comments: 4949 2007. [\n                    http:\/\/tools.ietf.org\/html\/rfc4949\n                    \n                  ]"},{"key":"74_CR32","volume-title":"Carnegie Mellon University, Technical Report 642","author":"D Fisher","year":"2011","unstructured":"Fisher D, McClune JM: ADJ Andrews, Trust and trusted computing platforms. Carnegie Mellon University, Technical Report 642 2011. [\n                    http:\/\/repository.cmu.edu\/sei\/642\n                    \n                  ]"},{"issue":"2","key":"74_CR33","first-page":"62","volume":"10","author":"G Coker","year":"2011","unstructured":"Coker G, Guttman J, Loscocco P, Herzog A, Millen J, OHanlon B, Ramsdell J, Segall A, Sheehy J, Sniffen B: Principles of remote attestation. Int J Inf Security 2011, 10(2):62-83.","journal-title":"Int J Inf Security"},{"key":"74_CR34","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-540-73275-4_16","volume-title":"Proceedings of the 4th European Conference on Security and Privacy in Ad-hoc and Sensor Networks, ser. ESAS'07","author":"B Smyth","year":"2007","unstructured":"Smyth B, Ryan M, Chen L: Direct anonymous attestation (DAA): ensuring privacy with corrupt administrators. Proceedings of the 4th European Conference on Security and Privacy in Ad-hoc and Sensor Networks, ser. ESAS'07 Springer-Verlag, Heidelberg; 2007, 218-231. [\n                    http:\/\/portal.acm.org\/citation.cfm?id=1784404.1784426\n                    \n                  ]"},{"key":"74_CR35","first-page":"3","volume-title":"VM'04: Proceedings of the 3rd Conference on Virtual Machine Research And Technology Symposium","author":"V Haldar","year":"2004","unstructured":"Haldar V, Chandra D, Franz M: Semantic remote attestation: a virtual machine directed approach to trusted computing. In VM'04: Proceedings of the 3rd Conference on Virtual Machine Research And Technology Symposium. USENIX Association, Berkeley, CA; 2004:3-3."},{"key":"74_CR36","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1179474.1179479","volume-title":"STC '06: Proceedings of the first ACM workshop on Scalable trusted computing","author":"L Chen","year":"2006","unstructured":"Chen L, Landfermann R, L'hr H, Rohe M, Sadeghi A, St'ble C: A protocol for property-based attestation. In STC '06: Proceedings of the first ACM workshop on Scalable trusted computing. ACM, New York; 2006:7-16."},{"key":"74_CR37","first-page":"154","volume-title":"IEEE Symposium on Security and Privacy","author":"E Shi","year":"2005","unstructured":"Shi E, Perrig A, Doorn LV: Bind: a fine-grained attestation service for secure distributed systems. IEEE Symposium on Security and Privacy 2005, 154-168."},{"key":"74_CR38","unstructured":"A. Corporation, Amd platform for trustworthy computing WinHEC 2003 Microsoft; 2003. [\n                    http:\/\/www.microsoft.com\/whdc\/winhec\/papers03.mspx\n                    \n                  ]"},{"key":"74_CR39","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1145\/945445.945464","volume-title":"Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, ser. SOSP '03","author":"T Garfinkel","year":"2003","unstructured":"Garfinkel T, Pfaff B, Chow J, Rosenblum M, Boneh D: Terra: a virtual machine-based platform for trusted computing. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, ser. SOSP '03. ACM, New York; 2003:193-206."},{"key":"74_CR40","first-page":"426","volume-title":"International Conference on Cooperative Information Systems","author":"J Jang","year":"2006","unstructured":"Jang J, Nepal S, Zic J: Establishing a trust relationship in cooperative information systems. International Conference on Cooperative Information Systems 2006, 426-443."},{"key":"74_CR41","first-page":"743","volume-title":"Proceedings of the IEEE International Conference on Web Services, ser. ICWS '05","author":"S Yoshihama","year":"2005","unstructured":"Yoshihama S, Ebringer T, Nakamura M, Munetoh S, Maruyama H: Ws-attestation: efficient and fine-grained remote attestation on web services. In Proceedings of the IEEE International Conference on Web Services, ser. ICWS '05. IEEE Computer Society, Washington, DC; 2005:743-750."},{"key":"74_CR42","unstructured":"Gumstix Overo Earth[\n                    http:\/\/www.gumstix.com\/\n                    \n                  ]"},{"key":"74_CR43","unstructured":"I. Corporation, Low pin count interface specification2002. [\n                    http:\/\/www.intel.com\/design\/chipsets\/industry\/25128901.pdf\n                    \n                  ]"},{"key":"74_CR44","unstructured":"S. Committee, Sff-8485 specification for serial gpio (sgpio) bus, revision 0.72006. [\n                    ftp:\/\/ftp.seagate.com\/sff\/SFF-8485.PDF\n                    \n                  ]"},{"key":"74_CR45","unstructured":"TCG Software Stack (TSS) Specification"},{"key":"74_CR46","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/1655108.1655117","volume-title":"Proceedings of the 2009 ACM workshop on Scalable Trusted Computing, ser. STC '09","author":"L Davi","year":"2009","unstructured":"Davi L, Sadeghi A-R, Winandy M: Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. In Proceedings of the 2009 ACM workshop on Scalable Trusted Computing, ser. STC '09. ACM, New York; 2009:49-54."},{"key":"74_CR47","first-page":"417","volume-title":"TRUST","author":"A-R Sadeghi","year":"2010","unstructured":"Sadeghi A-R, Schneider T, Winandy M: Token-based cloud computing. TRUST 2010, 417-429."},{"key":"74_CR48","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/1314354.1314364","volume-title":"Proceedings of the 2007 ACM workshop on Scalable Trusted Computing, ser. STC '07","author":"M van Dijk","year":"2007","unstructured":"van Dijk M, Rhodes J, Sarmenta LFG, Devadas S: Offline untrusted storage with immediate detection of forking and replay attacks. In Proceedings of the 2007 ACM workshop on Scalable Trusted Computing, ser. STC '07. ACM, New York; 2007:41-48."},{"key":"74_CR49","first-page":"127","volume-title":"Proceedings of the 21st Annual Computer Security Applications Conference","author":"D Bruschi","year":"2005","unstructured":"Bruschi D, Cavallaro L, Lanzi A, Monga M: Replay attack in tcg specification and solution. Proceedings of the 21st Annual Computer Security Applications Conference IEEE Computer Society, Washington, DC; 2005, 127-137. [\n                    http:\/\/portal.acm.org\/citation.cfm?id=1106778.1106817\n                    \n                  ]"},{"key":"74_CR50","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-19751-2_8","volume-title":"Formal Aspects of Security and Trust, ser. Lecture Notes in Computer Science","author":"S Delaune","year":"2011","unstructured":"Delaune S, Kremer S, Ryan M, Steel G: A formal analysis of authentication in the tpm. In Formal Aspects of Security and Trust, ser. Lecture Notes in Computer Science. Volume 6561. Edited by: Degano P, Etalle S, Guttman J. Springer, Heidelberg; 2011:111-125."},{"key":"74_CR51","first-page":"531","volume":"16","author":"M Pirker","year":"2010","unstructured":"Pirker M, Toegl R: Towards a virtual trusted platform. J Universal Comput Sci 2010, 16: 531-542.","journal-title":"J Universal Comput Sci"},{"key":"74_CR52","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1109\/SP.2010.17","volume-title":"Proceedings of the 2010 IEEE Symposium on Security and Privacy, ser. SP '10","author":"JM McCune","year":"2010","unstructured":"McCune JM, Li Y, Qu N, Zhou Z, Datta A, Gligor V, Perrig A: Trustvisor: efficient tcb reduction and attestation. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, ser. SP '10. IEEE Computer Society, Washington, DC; 2010:143-158."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2011-75\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2011-75.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2011-75.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T21:53:14Z","timestamp":1548107594000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2011-75"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8,25]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["74"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2011-75","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8,25]]},"article-number":"75"}}