Threat-adaptive architectures for trusted platform modules in secure computing systems
暂无分享,去创建一个
[1] Klaus D. Müller-Glaser,et al. Configuration Measurement for FPGA-based Trusted Platforms , 2009, 2009 IEEE/IFIP International Symposium on Rapid System Prototyping.
[2] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Public Key Cryptography.
[3] Thomas H. Lee,et al. 512-Mb PROM with a three-dimensional array of diode/antifuse memory cells , 2003 .
[4] Bernhard Kauer,et al. Authenticated booting for L4 , 2004 .
[5] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1991, STOC '91.
[6] Dianxiang Xu,et al. Threat-driven modeling and verification of secure software using aspect-oriented Petri nets , 2006, IEEE Transactions on Software Engineering.
[7] Fred B. Schneider,et al. Enforceable security policies , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[8] W.R. Tonti,et al. eFuse Design and Reliability , 2008, 2008 IEEE International Integrated Reliability Workshop Final Report.
[9] Bernhard Kauer. OSLO: Improving the Security of Trusted Computing , 2007, USENIX Security Symposium.