Secure delivery of conditional access applications to mobile receivers
暂无分享,去创建一个
[1] D. J. Cutts. DVB conditional access , 1996 .
[2] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[3] G. Edward Suh,et al. The AEGIS Processor Architecture for Tamper-Evident and Tamper-Resistant Processing , 2003 .
[4] G. Edward Suh,et al. Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions , 2005, ISCA 2005.
[5] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[6] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003 .
[7] Birgit Pfitzmann,et al. The PERSEUS System Architecture , 2001 .
[8] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[9] Ahmad-Reza Sadeghi,et al. Taming "Trusted Platforms" by Operating System Design , 2003, WISA.
[10] Siani Pearson,et al. Trusted Computing Platforms: TCPA Technology in Context , 2002 .