Verify Memory Integrity Basing on Hash Tree and MAC Combined Approach
暂无分享,去创建一个
[1] G. Edward Suh,et al. Offline Integrity Checking of Untrusted Storage , 2003 .
[2] G. Edward Suh,et al. Caches and Merkle Trees for Efficient Memory Authentication , 2002 .
[3] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[4] Radek Vingralek,et al. How to build a trusted database system on untrusted storage , 2000, OSDI.
[5] Dennis Shasha,et al. Don't trust your file server , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[6] Fujita Tomonori,et al. Protecting the integrity of an entire file system , 2003, First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings..