{"id":"https://openalex.org/W2068713433","doi":"https://doi.org/10.1145/1866307.1866419","title":"A portable TPM based on USB key","display_name":"A portable TPM based on USB key","publication_year":2010,"publication_date":"2010-10-04","ids":{"openalex":"https://openalex.org/W2068713433","doi":"https://doi.org/10.1145/1866307.1866419","mag":"2068713433"},"language":"en","primary_location":{"id":"doi:10.1145/1866307.1866419","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1866307.1866419","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM conference on Computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072653266","display_name":"Dawei Zhang","orcid":"https://orcid.org/0000-0001-5942-8245"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dawei Zhang","raw_affiliation_strings":["Beijing Jiaotong University, Beijing, China","[Beijing Jiaotong University, Beijing, China]"],"affiliations":[{"raw_affiliation_string":"Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"[Beijing Jiaotong University, Beijing, China]","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059369429","display_name":"Zhen Han","orcid":"https://orcid.org/0000-0002-3688-873X"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Han","raw_affiliation_strings":["Beijing Jiaotong University, Beijing, China","[Beijing Jiaotong University, Beijing, China]"],"affiliations":[{"raw_affiliation_string":"Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"[Beijing Jiaotong University, Beijing, China]","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089805010","display_name":"Guangwen Yan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guangwen Yan","raw_affiliation_strings":["Beijing Watchdata System Company, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Watchdata System Company, Beijing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072653266"],"corresponding_institution_ids":["https://openalex.org/I21193070"],"apc_list":null,"apc_paid":null,"fwci":1.3874,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.88190373,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"750","last_page":"752"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14067","display_name":"Cloud Computing and Remote Desktop Technologies","score":0.974399983882904,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.885150134563446},{"id":"https://openalex.org/keywords/trusted-platform-module","display_name":"Trusted Platform Module","score":0.8778417110443115},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.775876522064209},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.7684760689735413},{"id":"https://openalex.org/keywords/usb","display_name":"USB","score":0.6971562504768372},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6106874942779541},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5108153820037842},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.5097055435180664},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5028502345085144},{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.4626845121383667},{"id":"https://openalex.org/keywords/java-card","display_name":"Java Card","score":0.43419021368026733},{"id":"https://openalex.org/keywords/trusted-network-connect","display_name":"Trusted Network Connect","score":0.41088947653770447},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35883980989456177},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.1267862319946289},{"id":"https://openalex.org/keywords/java-applet","display_name":"Java applet","score":0.08175322413444519}],"concepts":[{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.885150134563446},{"id":"https://openalex.org/C202775310","wikidata":"https://www.wikidata.org/wiki/Q1140366","display_name":"Trusted Platform Module","level":2,"score":0.8778417110443115},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.775876522064209},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.7684760689735413},{"id":"https://openalex.org/C507366226","wikidata":"https://www.wikidata.org/wiki/Q42378","display_name":"USB","level":3,"score":0.6971562504768372},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6106874942779541},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5108153820037842},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.5097055435180664},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5028502345085144},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.4626845121383667},{"id":"https://openalex.org/C47747970","wikidata":"https://www.wikidata.org/wiki/Q46101","display_name":"Java Card","level":4,"score":0.43419021368026733},{"id":"https://openalex.org/C206149592","wikidata":"https://www.wikidata.org/wiki/Q3999882","display_name":"Trusted Network Connect","level":3,"score":0.41088947653770447},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35883980989456177},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.1267862319946289},{"id":"https://openalex.org/C15524039","wikidata":"https://www.wikidata.org/wiki/Q865817","display_name":"Java applet","level":3,"score":0.08175322413444519}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1866307.1866419","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1866307.1866419","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM conference on Computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2150002245","https://openalex.org/W2172358039"],"related_works":["https://openalex.org/W2355956995","https://openalex.org/W2372678089","https://openalex.org/W104943326","https://openalex.org/W2381474365","https://openalex.org/W2383968738","https://openalex.org/W2371948564","https://openalex.org/W2357322421","https://openalex.org/W2089589964","https://openalex.org/W2366111855","https://openalex.org/W4245180337"],"abstract_inverted_index":{"Trusted":[0,20],"computing":[1],"technology":[2],"aims":[3],"to":[4,40,49,65,70],"enhance":[5],"the":[6,11,55,58,67,71,77,89,112,115,128],"security":[7],"of":[8,18,32,84,93],"platform":[9,81],"by":[10],"TPM.":[12],"But":[13],"there":[14],"are":[15,103],"some":[16],"drawbacks":[17],"TCG's":[19],"Computing":[21],"architecture":[22],"for":[23,133],"user-based":[24,134],"applications.":[25],"This":[26],"paper":[27],"presents":[28],"a":[29,51],"new":[30],"concept":[31],"portable":[33],"TPM":[34,94],"(PTM)":[35],"based":[36,105],"on":[37,106,114],"USB":[38,116],"Key":[39,117],"solve":[41],"those":[42],"problems.":[43],"At":[44,108],"first,":[45],"we":[46,75,110],"use":[47],"PTM":[48,113,129],"establish":[50],"trusted":[52],"path":[53],"between":[54,100],"verifier":[56],"and":[57,80,95],"user":[59],"in":[60],"remote":[61],"attestation":[62],"so":[63],"as":[64],"propagate":[66],"trust":[68,78],"chain":[69],"end":[72],"user.":[73],"Secondly,":[74],"design":[76],"model":[79,88],"management":[82],"mechanism":[83],"PTM.":[85,107],"In":[86],"this":[87],"single":[90],"point":[91],"failure":[92],"frequent":[96],"sensitive":[97],"data":[98],"migrations":[99],"different":[101],"platforms":[102],"avoided":[104],"last,":[109],"implement":[111],"with":[118],"Java":[119],"Card":[120],"Runtime":[121],"Environment.":[122],"The":[123],"test":[124],"results":[125],"show":[126],"that":[127],"scheme":[130],"is":[131],"feasible":[132],"application.":[135]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
