{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T14:19:10Z","timestamp":1772547550671,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,3,25]],"date-time":"2020-03-25T00:00:00Z","timestamp":1585094400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,25]],"date-time":"2020-03-25T00:00:00Z","timestamp":1585094400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100010221","name":"Higher Education Commision, Pakistan","doi-asserted-by":"publisher","award":["2(1078)\/HEC\/M&E\/2018\/707"],"award-info":[{"award-number":["2(1078)\/HEC\/M&E\/2018\/707"]}],"id":[{"id":"10.13039\/501100010221","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11235-020-00656-y","type":"journal-article","created":{"date-parts":[[2020,3,25]],"date-time":"2020-03-25T06:03:01Z","timestamp":1585116181000},"page":"379-403","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Analytical study of hardware-rooted security standards and their implementation techniques in mobile"],"prefix":"10.1007","volume":"74","author":[{"given":"Naveeda","family":"Ashraf","sequence":"first","affiliation":[]},{"given":"Ashraf","family":"Masood","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-2437-4870","authenticated-orcid":false,"given":"Haider","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Rabia","family":"Latif","sequence":"additional","affiliation":[]},{"given":"Narmeen","family":"Shafqat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,25]]},"reference":[{"key":"656_CR1","unstructured":"Sallam, A., The new era of mega trends: Hardware rooted security. Hardware, Security, and Emerging Solutions, Citrix Solutions. Retrieved from https:\/\/linproxy.fan.workers.dev:443\/https\/www.citrix.com\/articles-and-insights\/trends-and-innovation\/jan-2015\/the-new-era-of-mega-trends-hardware-rooted-security.html."},{"key":"656_CR2","unstructured":"NIST SP 800-164 (2012). Guidelines on Hardware Rooted Security in Mobile Devices. Retrieved from https:\/\/linproxy.fan.workers.dev:443\/https\/csrc.nist.gov\/publications\/detail\/sp\/800-164\/draft."},{"key":"656_CR3","unstructured":"NIST SP 800-124 Revision 1, Guidelines for Managing and Securing Mobile Devices in the Enterprise. Retrieved from https:\/\/linproxy.fan.workers.dev:443\/https\/csrc.nist.gov\/publications\/detail\/sp\/800-124\/rev-1\/final."},{"key":"656_CR4","unstructured":"NIST SP 800-111, Guide to Storage Encryption Technologies for End User Devices. Retrieved from https:\/\/linproxy.fan.workers.dev:443\/https\/csrc.nist.gov\/publications\/detail\/sp\/800-111\/final."},{"key":"656_CR5","unstructured":"TCG Published (2011). \u201cMobile Trusted Module 2.0 Use Cases\u201d, Specification Version 1.0, 4 March 2011."},{"key":"656_CR6","doi-asserted-by":"crossref","unstructured":"Gro\u00dfschadl, J. (2008). Reassessing the TCG specifications for trusted computing in mobile and embedded systems. In IEEE international workshop on hardware-oriented security and trust (pp. 84\u201390). IEEE Computer Society.","DOI":"10.1109\/HST.2008.4559060"},{"issue":"8","key":"656_CR7","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1109\/JPROC.2014.2332007","volume":"102","author":"N Asokan","year":"2014","unstructured":"Asokan, N. (2014). Mobile trusted computing. Proceedings of the IEEE,102(8), 1189\u20131206.","journal-title":"Proceedings of the IEEE"},{"key":"656_CR8","unstructured":"TCG Published. (2008). TCG mobile reference architecture. Specification version 1.0, Revision 5."},{"issue":"1","key":"656_CR9","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/TCE.2010.5439136","volume":"56","author":"Mooseop Kim","year":"2010","unstructured":"Kim, Mooseop, Hongil, Ju, Kim, Youngsae, Park, Jiman, & Park, Youngsoo. (2010). Design and implementation of mobile trusted module for trusted mobile computing. IEEE Transaction on Consumer Electronics,56(1), 134\u2013140.","journal-title":"IEEE Transaction on Consumer Electronics"},{"key":"656_CR10","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-1-4614-7915-4","volume-title":"Secure smart embedded devices, platforms and applications","author":"K Markantonakis","year":"2014","unstructured":"Markantonakis, K., & Mayes, K. (2014). Secure smart embedded devices, platforms and applications (pp. 71\u201394). Berlin: Springer."},{"issue":"2","key":"656_CR11","first-page":"544","volume":"32","author":"KN McGill","year":"2013","unstructured":"McGill, K. N. (2013). Trusted mobile devices: requirements for a mobile trusted platform module. Johns Hopkins Technical Digest,32(2), 544\u2013554.","journal-title":"Johns Hopkins Technical Digest"},{"issue":"4","key":"656_CR12","first-page":"19","volume":"2","author":"F Dickson","year":"2014","unstructured":"Dickson, F. (2014). Hardening android:\u00a0Building security\u00a0into\u00a0core mobile devices. Secure Networking in\u00a0Frost\u00a0and\u00a0Sullivan, 2(4), 19\u201321.","journal-title":"Secure Networking in Frost and Sullivan"},{"key":"656_CR13","unstructured":"Samsung Knox Security Solution, Samsung Electronics Whitepaper, Version 2.2, May 2017."},{"key":"656_CR14","unstructured":"MT2502ASOCProcessor Technical Brief (September 2014) MediaTek Corporation,\nVersion 1.0."},{"key":"656_CR15","unstructured":"Enhanced Security Features for Applications and Data In-use (2019). Intel SGX Product Brief."},{"key":"656_CR16","unstructured":"iOS Security, iOS 12.3 (2019) Apple Corporation Whitepaper."},{"key":"656_CR17","unstructured":"Antutu Benchmark Report (2018). Global Android Smartphone User Preferences for Q2."},{"key":"656_CR18","unstructured":"NIST IR 8114 (2017). Report on lightweight cryptography. Retrieved from https:\/\/linproxy.fan.workers.dev:443\/https\/nvlpubs.nist.gov\/nistpubs\/ir\/2017\/NIST.IR.8114.pdf."},{"key":"656_CR19","unstructured":"Beaulieu, R., Shors, D., Smith, J. (2015). Simon and speck: Block ciphers for the internet of things. NSA document."},{"key":"656_CR20","unstructured":"Cazorla, M., Marquet, K., & Minier M. (2013). Survey and benchmark of lightweight block ciphers for wireless sensor networks.\u00a0In 2013 international conference on security and cryptography (SECRYPT) (pp. 1\u20136)."},{"key":"656_CR21","doi-asserted-by":"publisher","unstructured":"Lara-Nino, C. A., & Morales-Sandoval, M. An evaluation of AES and present ciphers for lightweight cryptography on smartphones. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/conielecomp.2016.7338557.","DOI":"10.1109\/conielecomp.2016.7338557"},{"issue":"1","key":"656_CR22","first-page":"1","volume":"1","author":"J Hosseinzadeh","year":"2017","unstructured":"Hosseinzadeh, J., & Bafghi, A. (2017). Evaluation of lightweight block ciphers in hardware implementation: A comprehensive survey. IEEE International Conference on New Research Achievements in Electrical and computer Engineering, 1(1), 1\u20137.","journal-title":"IEEE International Conference on New Research Achievements in Electrical and computer Engineering"},{"key":"656_CR23","unstructured":"Rinne, S., Eisenbarth, T., Paar C. (2007). Performance analysis of contemporary light-weight block ciphers on 8-bit microcontrollers. In Speed 2007."},{"issue":"7","key":"656_CR24","first-page":"806","volume":"8","author":"BT Hammad","year":"2017","unstructured":"Hammad, B. T., Jamil, N., Rusli, M. E., & Reza, M. E. (2017). A survey of lightweight cryptographic hash function. International Journal of Scientific and Engineering Research,8(7), 806\u2013814.","journal-title":"International Journal of Scientific and Engineering Research"},{"key":"656_CR25","doi-asserted-by":"crossref","unstructured":"Badel, S., Da\u011ftekin, N., Nakahara Jr., J., Ouafi, K., Reff\u00e9, N., Sepehrdad, P., & Vaudenay, S. (2010) \u201cARMADILLO: A multi-purpose cryptographic primitive dedicated to hardware. In Cryptographic hardware and embedded systems, CHES 2010 (pp. 398\u2013412). Springer.","DOI":"10.1007\/978-3-642-15031-9_27"},{"key":"656_CR26","unstructured":"Koyama, T., Sasaki, Y., & Kunihiro, N. (2012). Multi-differential cryptanalysis on reduced DM-PRESENT-80: Collisions and other differential properties. In Information security and cryptology\u2013ICISC (pp. 352\u2013367). Springer."},{"key":"656_CR27","doi-asserted-by":"crossref","unstructured":"Berger, T. P., D\u2019Hayer, J., Marquet, K., Minier, M., & Thomas, G. (2012). The GLUON family: A lightweight hash function family based on FCSRs. In Progress in cryptology-AFRICACRYPT (pp. 306\u2013323). Springer.","DOI":"10.1007\/978-3-642-31410-0_19"},{"key":"656_CR28","unstructured":"Guo, J., Peyrin, T., & Poschmann, A. (2011). The PHOTON family of lightweight hash functions. In: Advances in cryptology\u2013CRYPTO (pp. 222\u2013239). Springer."},{"key":"656_CR29","unstructured":"Abdelraheem, M. A. (2012). Estimating the probabilities of low-weight differential and linear approximations on PRESENT-like ciphers. In Information security and cryptology\u2013ICISC 2012 (pp. 368\u2013382). Springer."},{"key":"656_CR30","unstructured":"Building a Secure System using TrustZone Technology (2009). ARM security technology whitepaper. Retrieved from https:\/\/linproxy.fan.workers.dev:443\/http\/infocenter.arm.com\/help\/topic\/com.arm.doc.prd29-genc-009492c\/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf."},{"key":"656_CR31","unstructured":"Smc Calling Convention- System Software on ARM Platforms (2016). ARM Security Technology."},{"key":"656_CR32","unstructured":"TrustZone API Specification version 3.0 (2009). ARM Security Technology. Retrieved from https:\/\/linproxy.fan.workers.dev:443\/http\/infocenter.arm.com\/help\/index.jsp?topic=\/com.arm.doc.prd29-genc-009492c\/index.html."},{"key":"656_CR33","unstructured":"Raj, H., Saroiu, S., Wolman, A., Aigner, R., Cox, J., England, P., Fenner, C., Kinshumann, K., Loeser, J., Mattoon, D., Nystrom, M., Robinson, D., Spiger, R., Thom, S., & Wooten, D. (2016). fTPM: A software-only implementation of a TPM Chip. In Proceedings of 25th USENIX security symposium."},{"key":"656_CR34","unstructured":"RFC 8017 (2016). PKCS #1: RSA Cryptography Specification Version 2.2\u201d, ISSN: 2070-1721."},{"key":"656_CR35","unstructured":"Aututu Global Phone Users\u2019 Preference Report for Q1 2019 (2019). Antutu Benchmark Report, doc\/117726."},{"key":"656_CR36","unstructured":"Antutu Report: Global Android Smartphone User Preferences for Q2 2018 (2018). Antutu Benchmark Report, doc\/115174."},{"key":"656_CR37","unstructured":"Top 10 Global Popular Phones and User Preferences, Q3 2016 (2016). Antutu Benchmark Report, doc\/107641."},{"key":"656_CR38","unstructured":"Building a Titan: Better security through a tiny chip (2018). Android Developers Platform Blog by Google Inc., Retrieved 10 October, 2019 from https:\/\/linproxy.fan.workers.dev:443\/https\/android-developers.googleblog.com\/2018\/10\/building-titan-better-security-through.html."},{"key":"656_CR39","unstructured":"Android Keystore System (2019). Android developers platform documentation by Google Inc., Retrieved 10 October, 2019 from https:\/\/linproxy.fan.workers.dev:443\/https\/developer.android.com\/training\/articles\/keystore.html."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/s11235-020-00656-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/article\/10.1007\/s11235-020-00656-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/s11235-020-00656-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,25]],"date-time":"2021-03-25T00:11:09Z","timestamp":1616631069000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/10.1007\/s11235-020-00656-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,25]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["656"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s11235-020-00656-y","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,25]]},"assertion":[{"value":"25 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}