[1] |
Trusted Computing Group. Summary of features under consideration for the next generation of TPM[EB/OL]. , 2009.
|
[2] |
BALFE S , GALLERY E , MITCHELL C J , et al. Challenges for trusted computing[J]. IEEE Security & Privacy, 2008,6(6): 60-66.
|
[3] |
Trusted Computing Group. Trusted computing platform alliance (TCPA) main specification version 1.1b[EB/OL]. , 2001.
|
[4] |
BRICHELL E , CAMENISCH J , CHEN L Q . Direct anonymous attestation[A]. Proceedings of the 11th ACM Conference on Computer and Communications Security[C]. New York,NY,USA, 2004. 132-145.
|
[5] |
EMANUELE C , HANS L , GIANLUCA R , et al. Anonymous authentication with TLS and DAA[A]. IEEE VTC Fall[C]. TRUST 2010,LNCS 6101, 2010. 47-62.
|
[6] |
WALKER J , LI J T . Key exchange with anonymous authentication using DAA-SIGMA protocol[A]. INTRUST 2010,LNCS 6802[C]. Ottawa,Canada, 2011. 108-127.
|
[7] |
CAMENISCH J , LYSYANSKAY A . Dynamic accumulators and application to efficient revocation of anonymous credentials[A]. Cryptology—CRYPTO 2002[C]. Springer Verlag, 2002. 61-76.
|
[8] |
CAMENISCH J , STADLER M . Efficient group signature schemes for large groups[A]. CRYPTO '97[C]. Springer Verlag, 1997. 410-424.
|
[9] |
GE H , TATE S R . A direct anonymous attestation scheme for embedded devices[A]. PKC 2007[C]. Springer,Heidelberg, 2007.
|
[1] |
CAMENISCH J , MICHELS M . A Group Signature Scheme Based on an RSA-Variants[R]. Technical Report RS-98-27,BRICS, University of Aarhus, 1998.
|
[11] |
REHBOCKA S , HUNT R . Trustworthy clients: extending TNC to Web-based environments[J]. Computer Communications, 2009,32(5): 1006-1013.
|
[12] |
MENEZES A J , OORSCHOT P C , VANSTONE S A . Handbook of Applied Cryptography[M]. CRC Press,Inc, 1997. 613-619.
|