[1] |
冯登国, 秦宇, 汪丹 等. 可信计算技术研究[J]. 计算机研究与发展, 2011,48(8):1332-1349. FENG D G , QIN Y , WANG D , et al. Research on trusted computing technology[J]. Journal of Computer Research and Development, 2011,48(8):1332-1349.
|
[11] |
BRICKELL E , CAMENISCH J , CHEN L Q . Direct anonymous at-testation[A]. Proceedings of the 11th ACM Conference on Computer and Communications security[C]. Washington, DC, USA, 2004.
|
[3] |
Trusted Computing Group. TPM main specification version 1.2[EB/OL]. , 2011.
|
[4] |
REID J , NIETO J M G , DAWSON E , et al. Privacy and trusted com-puting[J]. Proceedings of the 14th International Workshop on Data-base and Expert Systems Applications[C]. Prague, Czech Republic, 2003.
|
[5] |
PIRKER M , TOEGEL R , HEIN D , et al. privacy CA for anonymityand trust[J]. Proceedings of the 2nd International Conference on Trusted Computing[C]. Oxford, UK, 2009.
|
[6] |
CHEN L Q , WARINSCHI B . Security of the TCG privacy-CA solu-tion[J]. Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous[C]. Hong Kong, China, 2010.
|
[7] |
CHEN L Q , LEE M F , WARINSCHI B . Security of the enhanced TCG privacy-CA solution[J]. Proceedings of the 6th International Confer-ence on Trustworthy Global Computing[C]. Aachen, Germany, 2011.
|
[8] |
杨力, 马建峰, 朱建明 . 可信的匿名无线认证协议[J]. 通信学报, 2009,30(9):29-35. YANG L , MA J F , ZHU J M . Trusted and anonymous authentication scheme for wireless networks[J]. Journal on Communications, 2009,30(9):29-35.
|
[9] |
杨力, 马建峰, 裴庆祺 等. 直接匿名的无线网络可信接入认证方案[J]. 通信学报, 2010,31(8):98-104. YANG L , MA J F , PEI Q Q , et al. Direct anonymous authentication scheme for wireless networks under trusted computing[J]. Journal on Communications, 2010,31(8):98-104.
|
[10] |
崔巍, 李益发, 斯雪明 . 基于 Eucalyptus 的基础设施即服务云框架协议设计[J]. 电子与信息学报, 2012,34(7):1748-1754. CUI W , LI Y F , SI X M . The protocol design of a Eucalyptus-based in-frastructure-as-a-service (IaaS) cloud framework[J]. Journal of Elec-tronics & Information Technology, 2012,34(7):1478-1754.
|
[11] |
WINKLER T , RINNER B . User-centric privacy awareness in video surveillance[J]. Multimedia Systems, 2012,18(2): 99-121.
|
[12] |
WINKLER T , RINNER B , ESTERLE L , et al. Privacy and security in video surveillance[J]. IEEE Signal Processing Magazine, 2013,30: 190-198.
|
[13] |
PIRKER M , WINTER J , TOEGL R . Lightweight Distributed Hetero-geneous Attested Android Clouds. Trust and Trustworthy Comput-ing[M]. Springer Berlin Heidelberg, 2012 122-141.
|
[14] |
FONGEN A , MANCINI F . Attested genuineness in service oriented environments[A]. Proceedings of the 3rd International Conference on Digital Information Processing and Communications[C]. 2013 8-17.
|
[15] |
KRAXBERGER S , TOEGL R , PIRKER M , et al. Trusted Identity Management for Overlay Networks[M]. Information Security Practice and Experience, Springer Berlin Heidelberg, 2013 16-30.
|
[16] |
陈小峰, 冯登国 . 一种多信任域内的直接匿名证明方案[J]. 计算机学报, 2008,31(7):1122-1130. CHEN X F , FENG D G . TA direct anonymous attestation scheme in multi-domain environment[J]. Chinese Journal of Computers, 2008,31(7):1122-1130.
|
[17] |
BRICKELL E , CHEN L Q , LI J T . A new direct anonymous attestation scheme from bilinear maps[A]. Proceedings of the 1st International Conference on Trusted Computing and Trust in Information Technolo-gies[C]. Villach, Austria, 2008.
|
[18] |
CHEN L Q , PAGE D , SMART N P . On the design and implementation of an efficient DAA scheme[A]. Proceedings of the 9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Ad-vanced Application[C]. Passau, Germany, 2010.
|
[19] |
CHEN X F , FENG D G . Direct anonymous attestation for next genera-tion TPM[J]. Journal of Computers, 2008,3(12): 43-50.
|
[20] |
BRICKELL E , LI J T . Enhanced privacy ID from bilinear pair-ing[EB/OL]. , 2011.
|
[21] |
CHEN L Q . A DAA scheme requiring less TPM resources[A]. Pro-ceedings of the 5th International Conference on Information Security and Cryptology[C]. Beijing, China, 2009.
|
[22] |
BRICKELL E , LI J T . A pairing-based DAA scheme further reducing TPM resources[A]. Proceedings of the 3rd International Conference on Trust and Trustworthy Computing[C]. Berlin, Germany, 2010.
|
[23] |
陈小峰, 冯登国 . 一种基于双线性映射的直接匿名证明方案[J]. 软件学报, 2010,21(8):2070-2078. CHEN X F , FENG D G . Direct anonymous attestation based on bilin-ear maps[J]. Journal of Software, 2010,21(8):2070-2078.
|
[24] |
杨力, 马建峰, 姜奇 . 无线移动网络跨可信域的直接匿名证明方案[J]. 软件学报, 2012,5(5):1260-1271. YANG L , JIANG Q . Direct anonymous attestation scheme in cross trusted domain for wireless mobile networks[J]. Journal of Soft-ware, 2012,5(5):1260-1271.
|
[25] |
DURGIN N , MITCHELL J C , PAVOLVIC D . A compositional logic for proving security properties of protocols[J]. Journal of Computer Securtity, 2003,11(4): 677-721.
|
[26] |
DATTA A , DEREK A , MITCHELL J C , et al. Protocol composition logic (PCL)[J]. Electronic Notes in Theoretical Computer Science, 2007,172: 311-358.
|
[27] |
HE C H , SUNDARARAJAN M , DATTA A , et al. A modular correct-ness proof of IEEE 802.11i and TLS[J]. Proceedings of the 12th ACM Conference on Computer and Communications Security[C]. Alexan-dria, USA, 2005. 2-15.
|