{"id":"https://openalex.org/W2488299659","doi":"https://doi.org/10.1007/978-3-319-31550-8_11","title":"Research on Trusted Bootstrap Based on the Universal Smart Card","display_name":"Research on Trusted Bootstrap Based on the Universal Smart Card","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2488299659","doi":"https://doi.org/10.1007/978-3-319-31550-8_11","mag":"2488299659"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-31550-8_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-31550-8_11","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108703913","display_name":"Lin Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lin Yan","raw_affiliation_strings":["Beijing Key Laboratory of Trusted Computing, Beijing, China","College of Computer Science, Beijing University of Technology, Beijing, China","National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Trusted Computing, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"College of Computer Science, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]},{"raw_affiliation_string":"National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034822825","display_name":"Jianbiao Zhang","orcid":"https://orcid.org/0000-0002-4917-7996"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianbiao Zhang","raw_affiliation_strings":["Beijing Key Laboratory of Trusted Computing, Beijing, China","College of Computer Science, Beijing University of Technology, Beijing, China","Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China","National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Trusted Computing, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"College of Computer Science, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]},{"raw_affiliation_string":"Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]},{"raw_affiliation_string":"National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5108703913"],"corresponding_institution_ids":["https://openalex.org/I37796252"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10439488,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"169","last_page":"182"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13243","display_name":"Innovation in Digital Healthcare Systems","score":0.9585999846458435,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.869215190410614},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.657934308052063},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.4819190800189972},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4365249276161194},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.23707330226898193}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.869215190410614},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.657934308052063},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.4819190800189972},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4365249276161194},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.23707330226898193}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-31550-8_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-31550-8_11","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1585267361","https://openalex.org/W1974781753","https://openalex.org/W1984382557","https://openalex.org/W2074769682","https://openalex.org/W2132257180","https://openalex.org/W2277781126","https://openalex.org/W2332919100","https://openalex.org/W2348237682","https://openalex.org/W2377517701","https://openalex.org/W2391951943"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2049353548","https://openalex.org/W2365715481","https://openalex.org/W2372678089","https://openalex.org/W2390279801","https://openalex.org/W2355956995","https://openalex.org/W2051856262","https://openalex.org/W2358668433","https://openalex.org/W2551102826"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
