Virtualisation of a SIM-Card using trusted computing
暂无分享,去创建一个
[1] Stefan Berger,et al. vTPM: Virtualizing the Trusted Platform Module , 2006, USENIX Security Symposium.
[2] Bernhard Walke. Mobilfunknetze und ihre Protokolle , 1998 .
[3] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[4] J. Meigs,et al. WHO Technical Report , 1954, The Yale Journal of Biology and Medicine.
[5] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[6] R. Sailer,et al. sHype : Secure Hypervisor Approach to Trusted Virtualized Systems , 2005 .
[7] Nicolai Kuntze,et al. Trusted Computing in Mobile Action , 2006, ISSA.