[1] |
冯登国 . 可信计算——理论与实践[M]. 北京: 清华大学出版社, 2013.
|
|
FENG D G . Trusted computing theory and practice[M]. Beijing: Tsinghua University PressPress, 2013.
|
[2] |
SHEN C X , ZHANG H G , WANG H M ,et al. Research on trusted computing and its development[J]. Science China:Information Sciences, 2010,53(3): 405-433.
|
[3] |
沈昌祥, 张焕国, 王怀民 ,等. 可信计算的研究与发展[J]. 中国科学, 2010,40(40): 139-166.
|
|
SHEN C X , ZHANG H G , WANG H M ,et al. Research and development of trusted computing[J]. Science China, 2010,40(40): 139-166.
|
[4] |
TCG. TPM specifications v2.0[EB/OL]. .
|
[5] |
LI H , HU H . UCFS:building a usage controlled file system with a trusted platform module[C]// 1st Chinese Conf on Trust Computing Theory and Practice. 2009: 10-23.
|
[6] |
YU A M , FENG D G , LIU R . TBDRM:a TPM based secure DRM architecture[C]// Int Conf on Computational Science and Engineering,Los Alamitos,CA. 2009: 671-677.
|
[7] |
徐明迪, 张焕国, 赵恒 . 可信计算平台信任链安全性分析[J]. 计算机学报, 2010,33(7): 1167-1176.
|
|
XU M D , ZHANG H G , ZHAO H . Security analysis of trust chain in trusted computing platform[J]. Chinese Journal of Computer, 2010,33(7): 1167-1176.
|
[8] |
周振柳, 陈楣, 池亚平 ,等. 一种柔性可信计算机模型与实现方法[J]. 计算机工程, 2007,33(20): 156-158.
|
|
ZHOU Z L , CHEN M , CHI Y P ,et al. A model and implementation of a flexible trusted computer[J]. Computer Engineering, 2007,33(): 156-158.
|
[9] |
司丽敏, 蔡勉, 陈银镜 ,等. 一种信任链传递模型研究[J]. 计算机科学, 2011,38(9): 36-42.
|
|
SI L M , CAI M , CHEN Y J ,et al. A study on trust chain transfer model[J]. Computer Science, 2011,38(9): 36-42.
|
[10] |
国家密码管理局. 可信密码支撑平台技术规范[EB/OL]. .
|
|
STATE ENCRYPTION ADMINISTRATION. Technical specification for trusted cryptographic support platform[EB/OL]. .
|
[11] |
中国可信计算工作组. 可信计算密码支撑平台功能与接口规范[EB/OL]. .
|
|
TRUSTED COMPUTING WORKING GROUP OF CHINA. The function and interface specification of trusted computing cryptographic support platform[EB/OL]. .
|
[12] |
吴小强 . 基于龙芯处理器的可信计算机研究与设计[J]. 工业控制计算机, 2011,24(11): 26-30.
|
|
WU X Q . Research and design of trusted computer based on Godson processor[J]. Industrial Control Computer, 2011,24(11): 26-30.
|
[13] |
朱小波, 舒棚, 周晓霞 . 基于TCM的国产可信计算机的设计[J]. 信息技术, 2013,12(12): 102-105.
|
|
ZHU X B , SHU P , ZHOU X X . Design of a domestic trusted computer based on TCM[J]. Information Technology, 2013,12(12): 102-105.
|
[14] |
秦宇, 冯登国 . 基于组件属性的远程证明[J]. 软件学报, 2009,20(6): 1625-1640.
|
|
QIN Y , FENG D G . Component property based remote attestation[J]. Journal of Software, 2009,20(6): 1625-1640.
|
[15] |
CHALLENER D . 可信计算[M]. 北京: 机械工业出版社, 2009.
|
|
CHALLENER D . A practical guide to trusted computing[M]. Beijing: China Machine PressPress, 2009.
|
[16] |
张焕国, 赵波 . 可信计算[M]. 武汉: 武汉大学出版社, 2011.
|
|
ZHANG H G , ZHAO B . Trusted computing[M]. Wuhan: Wuhan University PressPress, 2011.
|