共 83 条
- [1] Agazzi F., 2013, P 14 WORKSH OBJ AG T
- [2] Agazzi F., 2014, SCS M S MAGAZINE, V4, P65
- [3] Anderson A., 2004, SAML 2 0 PROFILE OFX
- [4] ANDERSON R, 2003, TRUSTED COMPUTING FR
- [5] Anderson R., 2003, P 22 ANN S PRINC DIS, P3, DOI [10.1145/872035.872036, DOI 10.1145/872035.872036]
- [6] ARBAUGH B, 2002, IEEE T COMPUT, V35, P77, DOI DOI 10.1109/MC.2002.1023792
- [7] A secure and reliable bootstrap architecture [J]. 1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 65 - 71
- [8] Balacheff B., 2000, INFORM SECURITY TECH, V5, P54, DOI DOI 10.1016/S1363-4127(00)87631-1
- [9] Secret handshakes from pairing-based key agreements [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 180 - 196
- [10] Trusted computing: Providing security for Peer-to-Peer networks [J]. FIFTH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2005, : 117 - 124