[1] |
中国互联网协会.中国移动互联网发展状况及其安全报告(2017)[R]. 北京:中国互联网协会. 2017.5.
|
|
Internet Society of China. China mobile Internet development and security report(2017)[R]. Beijing:Internet Society of China. 2017.5.
|
[2] |
赵波, 张焕国, 李晶 ,等. 可信PDA计算平台系统结构与安全机制[J]. 计算机学报, 2010,33(1): 82-92.
|
|
ZHAO B , ZHANG H G , LI J ,et al. The system architecture and security structure of trusted PDA[J]. Chinese Journal of Computers, 2010,33(1): 82-92.
|
[3] |
沈昌祥, 张焕国, 冯登国 ,等. 信息安全综述[J]. 中国科学:技术科学, 2007,37(2): 129-150.
|
|
SHEN C X , ZHANG H G , FENG D G ,et al. Summary of information security[J]. Scientia Sinica Informations, 2007,37(2): 129-150.
|
[4] |
张立强, 张焕国, 张帆 . 可信计算中的可信度量机制[J]. 北京工业大学学报, 2010,36(5): 586-591.
|
|
ZHANG L Q , ZAHNG H G , ZHANG F . The trust measurement scheme in trusted computing[J]. Journal of Beijing University of Technology, 2010,36(5): 586-591.
|
[5] |
段新东, 马建峰 . 可证明安全的可信网络存储协议[J]. 通信学报, 2011,32(5): 169-174.
|
|
DUAN X D , MA J F . Provable secure trusted protocol for network storage[J]. Journal on Communications, 2011,32(5): 169-174.
|
[6] |
ZHANG H G , WANG F . A behavior based remote trust attestation model[J]. Wuhan University Journal of Nature Sciences, 2006,11(6): 1819-1822.
|
[7] |
郑宇, 何大可, 何明星 . 基于可信计算的移动终端用户认证方案[J]. 计算机学报, 2006,29(8): 1255-1264.
|
|
ZHENG Y , HE D K , HE M X . Trusted computing based user authentication for mobile equipment[J]. Chinese Journal of Computers, 2006,29(8): 1255-1264.
|
[8] |
陈书义, 闻英友, 赵宏 . 基于可信计算的移动平台设计方案[J]. 东北大学学报(自然科学版), 2008,29(8): 1096-1099.
|
|
CHEN S Y , WEN Y Y , ZHAO H ,et al. Conceptual design of trusted mobile platform[J]. Journal of Northeastern University (Natural Science), 2008,29(8): 1096-1099.
|
[9] |
王晋, 喻潇, 刘畅 ,等. 智能电网环境下一种基于SDKey的智能移动终端远程证明方案[J]. 信息网络安全, 2018,7(1): 1-6.
|
|
WANG J , YU X , LIU C ,et al. A remote attestation scheme for intelligent mobile terminal based on SD key in smart grid environment[J]. Netinfo Security, 2018,7(1): 1-6.
|
[10] |
赵波, 费永康, 向騻 ,等. 嵌入式系统的安全启动机制研究与实现[J]. 计算机工程与应用, 2014,50(10): 72-77.
|
|
ZHAO B , FEI Y K , XIANG S ,et al. Research and implementation of secure boot mechanism for embeddedsystems[J]. Computer Engineering and Applications, 2014,50(10): 72-77.
|
[11] |
赵世军, 冯登国 . 基于属性证明的可信网络接入方案[J]. 武汉大学学报(理学版), 2012,58(6): 519-525.
|
|
ZHAO S J , FENG D G . A TNC Trusted network connection schema based on property attestation[J]. Journal of Wuhan University(Natural Science Edition), 2012,58(6): 519-525.
|
[12] |
彭国军, 邵玉如, 郑祎 . 移动智能终端安全威胁分析与防护研究[J]. 信息网络安全, 2012,12(1): 58-63.
|
|
PENG G J , SHAO Y R , ZHENG Y . Mobile intelligent terminal security threat analysis and protection research[J]. Netinfo Security, 2012,12(1): 58-63.
|
[13] |
JAEGER T , SAILER R , SHANKAR U . PRIMA:policy-reduced integrity measurement architecture[C]// The 11th ACM Symposium on Access Control Models and Technologies. 2006: 19-28.
|
[14] |
李春雅 . 基于 802.1X 的可信网络连接认证模型研究和实现[D]. 西安:西安电子科技大学,2010, 2010,10(7): 85-92.
|
|
LI C Y.Research and implementation of the trusted network connection authentication model based on 802 . 1X[D]. Xi’an:Xidian University,2010, 2010,10(7): 85-92.
|