Introduction to the TPM
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[3] Siani Pearson. Trusted Computing Platforms , the Next Security Solution , 2002 .
[4] Chris J. Mitchell,et al. Trusted Mobile Platforms , 2007, FOSAD.
[5] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[6] Sean W. Smith. Trusted Computing Platforms - Design and Applications , 2005 .
[7] Ross J. Anderson. Cryptography and competition policy: issues with 'trusted computing' , 2003, PODC '03.
[8] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[9] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[10] Aaron Weiss. Trusted computing , 2006, NTWK.
[11] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[12] Steven L. Kinney. Trusted Platform Module Basics: Using TPM in Embedded Systems (Embedded Technology) , 2006 .
[13] Siani Pearson,et al. Trusted Computing Platforms: TCPA Technology in Context , 2002 .
[14] Eimear Gallery. An overview of trusted computing technology , 2005 .