共 98 条
- [31] Chen LQ, 2008, LECT NOTES COMPUT SC, V5222, P31, DOI 10.1007/978-3-540-85886-7_3
- [32] Choi YG, 2007, LECT NOTES COMPUT SC, V4706, P1085
- [34] Collberg C., 1998, Conference Record of POPL '98: 25th ACM SIGPLAN-SIGACT. Symposium on Principles of Programming Languages, P184, DOI 10.1145/268946.268962
- [35] Cowan C, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P63
- [36] A Logic of Secure Systems and its Application to Trusted Computing [J]. PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, : 221 - 236
- [37] Douglis F., 1993, USENIX Association. Proceedings of the Winter 1993 USENIX Conference, P519
- [38] Eldefrawy K., 2012, Ndss, V12, P1
- [40] Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251