seTPM: Towards Flexible Trusted Computing on Mobile Devices Based on GlobalPlatform Secure Elements
暂无分享,去创建一个
[1] Ksheerabdhi Krishna,et al. Secure object sharing in java card , 1999 .
[2] Bernhard Kauer. OSLO: Improving the Security of Trusted Computing , 2007, USENIX Security Symposium.
[3] Heiko Stamer,et al. A Software-Based Trusted Platform Module Emulator , 2008, TRUST.
[4] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[5] Morris J. Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .
[6] Srinivas Devadas,et al. The Trusted Execution Module: Commodity General-Purpose Trusted Computing , 2008, CARDIS.
[7] Johannes Winter,et al. A Hijacker's Guide to the LPC Bus , 2011, EuroPKI.
[8] Keith Mayes,et al. Trusted Platform Module for Smart Cards , 2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS).
[9] Kenneth A. Goldman,et al. A Practical Guide to TPM 2.0 , 2015, Apress.
[10] Trent Jaeger,et al. Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.
[11] Stefan Berger,et al. vTPM: Virtualizing the Trusted Platform Module , 2006, USENIX Security Symposium.
[12] Zhen Han,et al. A portable TPM based on USB key , 2010, CCS '10.
[13] Leendert van Doorn,et al. A Practical Guide to Trusted Computing , 2007 .