[1] |
冯登国, 秦宇, 汪丹 ,等. 可信计算技术研究[J]. 计算机研究与发展, 2011,48(8): 1332-1349. FENG D G , QIN Y , WANG D ,et al. Research on trusted computing technology[J]. Journal of Computer Research and Development, 2011,48(8): 1332-1349.
|
[2] |
Trusted Computing Group. TPM main specification version 1.2[EB/OL]. .
|
[3] |
Trusted Computing Group-Mobile Phone Work Group. TCG mobile trusted module specification version 1.0[EB/OL]. .
|
[4] |
国家密码管理局. 可信计算密码支撑平台功能与接口规范[EB/OL]. .State Cryptography Administration. Functionality and interface specification of cryptographic support platform for trusted computing[EB/OL]. .
|
[5] |
Trusted Computing Group. Trusted platform module library[EB/OL]. .
|
[6] |
HAN L , LIU J , ZHANG D ,et al. A portable TPM scheme for general-purpose trusted computing based on EFI[A]. Proceedings of the 5th International Conference on Multimedia Information Networking and Security[C]. Beijing,China, 2009. 140-143.
|
[7] |
ZHANG D , HAN Z , YAN G . A portable TPM based on USB key[A]. Proceedings of the 17th ACM Conference on Computer and Communications Security[C]. Chicago,USA, 2010. 750-752.
|
[8] |
EKBERG JE , BUGIEL S . Trust in a small package:minimized MRTM software implementation for mobile secure environments[A]. Proceedings of the 4th ACM Workshop on Scalable Trusted Computing[C]. Chicago,USA, 2009. 9-18.
|
[9] |
DIETRICH K . An integrated architecture for trusted computing for java enabled embedded devices[A]. Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing[C]. Alexandria,USA, 2007. 2-6.
|
[10] |
DIETRICH K , WINTER J . Towards customizable,application specific mobile trusted modules[A]. Proceedings of the 5th ACM Workshop on Scalable Trusted Computing[C]. Chicago,USA, 2010. 31-40.
|
[11] |
WINTER J . Trusted computing building blocks for embedded linux-based ARM trustzone platforms[A]. Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing[C]. Alexandria,USA, 2008. 21-30.
|
[12] |
SANTOS N , RAJ H , SAROIU S ,et al. Using ARM trustzone to build a trusted language runtime for mobile applications[A]. Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems[C]. Salt Lake City,UT,USA, 2014. 67-80.
|
[13] |
WU C , ZHOU Y , PATEL K ,et al. AirBag:boosting smartphone resistance to malware infection[A]. Proceedings of the 21th Annual Network and Distributed System Security Symposium[C]. San Diego,California,USA, 2014.
|
[14] |
GILAD Y , HERZBERG A , TRACHTENBERG A . Securing smartphones:a micro-TCB approach[J]. IEEE Pervasive Computing Magazine, 2014.
|
[15] |
EISENBARTH T , GüNEYSU T , PAAR C ,et al. Reconfigurable trusted computing in hardware[A]. Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing[C]. Alexandria,USA, 2007. 15-20.
|
[16] |
SCHELLEKENS D , TUYLS P , PRENEEL B . Embedded trusted computing with authenticated non-volatile memory[A]. Proceedings of the 1st International Conference on Trusted Computing and Trust in Information Technologies[C]. Villach,Austria, 2008. 60-74.
|
[17] |
ARENO M , PLUSQUELLIC J . Securing trusted execution environments with PUF generated secret key[A]. Proceedings of the 11th IEEE International Conference on Trust,Security and Privacy in Computing and Communications[C]. Liverpool,UK, 2012. 1188-1193.
|
[18] |
BERGER S , CACERES R , GOLDMAN KA ,et al. vTPM:virtualizing the trusted platform module[A]. Proceedings of the 15th Conference on USENIX Security Symposium[C]. Vancouver,Canada, 2006. 305-320.
|
[19] |
ENGLAND P , LOESER J . Para-virtualized TPM sharing[A]. Proceedings of the 1st International Conference on Trusted Computing and Trust in Information Technologies[C]. Villach,Austria, 2008. 119-132.
|
[20] |
STUMPF F , ECKERT C . Enhancing trusted platform modules with hardware-based virtualization techniques[A]. Proceedings of the 2nd Second International Conference on Emerging Security Information,Systems and Technologies[C]. Cap Esterel,France, 2008. 1-9.
|
[21] |
CHEN C , RAJ H , SAROIU S ,et al. cTPM:a cloud TPM for cross-device trusted applications[A]. Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation[C]. Seattle,WA,USA, 2014. 187-201.
|
[22] |
Trusted Computing Group. TCG software stack (TSS) specification version 1.2[EB/OL]. .
|
[23] |
TPM Emulator. Software-based TPM emulator[EB/OL]. .
|
[24] |
Lynn B . PBC library–the pairing-based cryptography library[EB/OL]. .
|
[25] |
IBM’s software TPM. IBM software trusted platform module[EB/OL]. .
|
[26] |
Digia. Qt product[EB/OL]. .
|
[27] |
Thesycon. USB CDC/ACM class driver for Windows 8,7,Vista,XP[EB/OL]. .
|