{"id":"https://openalex.org/W2137390791","doi":"https://doi.org/10.1145/2557547.2557593","title":"TrustID","display_name":"TrustID","publication_year":2014,"publication_date":"2014-02-25","ids":{"openalex":"https://openalex.org/W2137390791","doi":"https://doi.org/10.1145/2557547.2557593","mag":"2137390791"},"language":"en","primary_location":{"id":"doi:10.1145/2557547.2557593","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557547.2557593","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM conference on Data and application security and privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://publica.fraunhofer.de/documents/N-301669.html","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080222919","display_name":"Julian Horsch","orcid":"https://orcid.org/0000-0001-9018-7048"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Julian Horsch","raw_affiliation_strings":["Fraunhofer AISEC, Garching near Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer AISEC, Garching near Munich, Germany","institution_ids":["https://openalex.org/I4210136922"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091848694","display_name":"Konstantin B\u00f6ttinger","orcid":"https://orcid.org/0000-0002-9337-7506"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Konstantin B\u00f6ttinger","raw_affiliation_strings":["Fraunhofer AISEC, Garching near Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer AISEC, Garching near Munich, Germany","institution_ids":["https://openalex.org/I4210136922"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038975831","display_name":"Michael Wei\u00df","orcid":"https://orcid.org/0000-0003-3514-5069"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Michael Wei\u00df","raw_affiliation_strings":["Fraunhofer AISEC, Garching near Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer AISEC, Garching near Munich, Germany","institution_ids":["https://openalex.org/I4210136922"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025303851","display_name":"Sascha Wessel","orcid":"https://orcid.org/0000-0002-9063-8416"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Sascha Wessel","raw_affiliation_strings":["Fraunhofer AISEC, Garching near Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer AISEC, Garching near Munich, Germany","institution_ids":["https://openalex.org/I4210136922"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059204478","display_name":"Frederic Stumpf","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Frederic Stumpf","raw_affiliation_strings":["Fraunhofer AISEC, Garching near Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer AISEC, Garching near Munich, Germany","institution_ids":["https://openalex.org/I4210136922"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5080222919"],"corresponding_institution_ids":["https://openalex.org/I4210136922"],"apc_list":null,"apc_paid":null,"fwci":1.5778,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.8858937,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"281","last_page":"288"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8039006590843201},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6690384149551392},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5998601317405701},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5944454669952393},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.580467939376831},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.5327916741371155},{"id":"https://openalex.org/keywords/subscriber-identity-module","display_name":"Subscriber identity module","score":0.5192694664001465},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.517723023891449},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.5167414546012878},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4942646026611328},{"id":"https://openalex.org/keywords/digital-identity","display_name":"Digital identity","score":0.4863343834877014},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.46197736263275146},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.4314391613006592},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2203095257282257},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.1600669026374817}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8039006590843201},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6690384149551392},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5998601317405701},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5944454669952393},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.580467939376831},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.5327916741371155},{"id":"https://openalex.org/C40367706","wikidata":"https://www.wikidata.org/wiki/Q230110","display_name":"Subscriber identity module","level":3,"score":0.5192694664001465},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.517723023891449},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.5167414546012878},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4942646026611328},{"id":"https://openalex.org/C2779813694","wikidata":"https://www.wikidata.org/wiki/Q528053","display_name":"Digital identity","level":3,"score":0.4863343834877014},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.46197736263275146},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.4314391613006592},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2203095257282257},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.1600669026374817},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C2779971919","wikidata":"https://www.wikidata.org/wiki/Q1378949","display_name":"Handset","level":2,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/2557547.2557593","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557547.2557593","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM conference on Data and application security and privacy","raw_type":"proceedings-article"},{"id":"pmh:oai:fraunhofer.de:N-301669","is_oa":true,"landing_page_url":"http://publica.fraunhofer.de/documents/N-301669.html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fraunhofer AISEC","raw_type":"Conference Paper"},{"id":"pmh:oai:publica.fraunhofer.de:publica/385328","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/385328","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"}],"best_oa_location":{"id":"pmh:oai:fraunhofer.de:N-301669","is_oa":true,"landing_page_url":"http://publica.fraunhofer.de/documents/N-301669.html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fraunhofer AISEC","raw_type":"Conference Paper"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.75}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W96787666","https://openalex.org/W121592505","https://openalex.org/W192122728","https://openalex.org/W203500824","https://openalex.org/W1574312199","https://openalex.org/W1626992774","https://openalex.org/W1930930738","https://openalex.org/W2114216056","https://openalex.org/W2134475940","https://openalex.org/W2153497135","https://openalex.org/W2157604883"],"related_works":["https://openalex.org/W2372678089","https://openalex.org/W2695299078","https://openalex.org/W2355956995","https://openalex.org/W2390768934","https://openalex.org/W2350048275","https://openalex.org/W2086874776","https://openalex.org/W2168345601","https://openalex.org/W2377235694","https://openalex.org/W2028268185","https://openalex.org/W2001281341"],"abstract_inverted_index":{"Identity":[0],"theft":[1],"has":[2],"deep":[3],"impacts":[4],"in":[5,55],"today's":[6],"mobile":[7,57],"ubiquitous":[8],"environments.":[9],"At":[10],"the":[11,33,75,78,85,131],"same":[12],"time,":[13],"digital":[14],"identities":[15,53,68],"are":[16],"usually":[17],"still":[18],"protected":[19],"by":[20],"simple":[21],"passwords":[22],"or":[23,99],"other":[24],"insufficient":[25],"security":[26],"mechanisms.":[27],"In":[28,104],"this":[29,40],"paper,":[30],"we":[31,136],"present":[32],"TrustID":[34],"architecture":[35,43],"and":[36],"protocols":[37,64,90],"to":[38,49,106,162],"improve":[39],"situation.":[41],"Our":[42],"utilizes":[44],"a":[45,56,60,70,94,100,112,126,138,142,148],"Secure":[46],"Element":[47],"(SE)":[48],"store":[50],"multiple":[51],"context-specific":[52,164],"securely":[54,66],"device,":[58],"e.g.,":[59],"smartphone.":[61],"We":[62],"introduce":[63],"for":[65,83,118],"deriving":[67],"from":[69],"strong":[71],"root":[72,160],"identity":[73,154,161],"into":[74],"SE":[76],"inside":[77],"smartphone":[79,96,146],"as":[80,82,159],"well":[81],"using":[84],"newly":[86],"derived":[87],"IDs.":[88],"Both":[89],"do":[91],"not":[92],"require":[93],"trustworthy":[95],"operating":[97],"system":[98],"Trusted":[101],"Execution":[102],"Environment.":[103],"order":[105],"achieve":[107],"this,":[108],"our":[109,134],"concept":[110],"includes":[111],"secure":[113],"combined":[114],"PIN":[115],"entry":[116],"mechanism":[117],"user":[119],"authentication,":[120],"which":[121],"prevents":[122],"attacks":[123],"even":[124],"on":[125,141],"malicious":[127],"device.":[128],"To":[129],"show":[130],"feasibility":[132],"of":[133],"approach,":[135],"implemented":[137],"prototype":[139],"running":[140],"Samsung":[143],"Galaxy":[144],"SIII":[145],"utilizing":[147],"microSD":[149],"card":[150,155],"SE.":[151],"The":[152],"German":[153],"nPA":[156],"is":[157],"used":[158],"derive":[163],"identities.":[165]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
