[1] |
STUDER A , PERRIG A . Mobile user location-specific encryption (MULE):using your office as your password[A]. Proceedings of the 3rd ACM Conference on Wireless Network Security (WiSec '10)[C]. 2010.
|
[2] |
VILA E , BOROVSKA P . Data protection utilizing trusted platform module[J]. Opportunities in Opportunistic Computing, 2010,43(1): 42-50.
|
[3] |
Trusted Computing Group. TPM main part 3 commands,spec fication version 1.2,level 2 revision 103[EB/OL]. , 2007.
|
[4] |
JOHN P , LEE R B . Protecting cryptographic keys and computations via virtual secure coprocessing[A]. ACM SIGARCH Computer Architecture News[C]. 2005.
|
[5] |
LOCASTO M E , SIDIROGLOU S , KEROMYTIS A D . Speculative virtual verification:policy-constrained speculative execution[A]. Proceedings of the New Security Paradigms Workshop (NSPW)[C]. 2005. 170-175.
|
[6] |
BELLOVIN S , MERRITT M . Augmented encrypted key exchange:a password-based protocol secure against dictionary attacks and pass-word file compromise[A]. Proceedings of the 1st ACM Conference on Computer and Communication Security[C]. New York, 1993. 244-250.
|
[7] |
FENG D G , XU J . A new client-to-client password-authenticated key agreement protocol[A]. Proceedings of IWCC 2009[C]. Berlin,Springer-Verlag, 2009. 63-76.
|
[8] |
PERLMAN R , KAUFMAN C . Secure password-based protocol for downloading a private key[A]. Proc NDSS’99[C]. 1999.
|
[9] |
GOLDREICH O , GOLDWASSER S , MICALI S . How to construct random functions[J]. ACM, 1986,33(4): 210-217.
|
[10] |
BELLARE M . New proofs for NMAC and HMAC:security without collision-resistance[A]. CRYPTO 2006[C]. Springer Verlag, 2006. 602-619.
|
[11] |
MACKENZIE P , REITER M . Networked cryptographic devices resilient to capture[A]. Proc IEEE Symposium on Security and Privacy[C]. Springer Verlay, 2001.
|
[12] |
XU S , SANDHU R A . Scalable and security cryptographic service[A]. Data and Applications Security XXI[C]. Berlin,Springer Verlag, 2007. 144-160.
|
[13] |
BELLARE M , ROGAWAY P . Random oracles are practical-a paradigm for designing efficient protocols[A]. Proceedings of the First ACM Conference on Computer and Communications Security[C]. 1993. 62-73.
|
[14] |
BELLARE M , ROGAWAY P . The exact security of digital signatureshow to sign with rsa and rabin[A]. Proceedings of EUROCRYPT’96[C]. 1996. 399-416.
|