共 31 条
[1]
[Anonymous], 2009, P 1 USENIX WORKSH H
[2]
[Anonymous], SECURITY
[3]
[Anonymous], SEC PRIV CONTR FED I
[4]
[Anonymous], 2013, P 8 ACM EUROPEAN C C, DOI [10.1007/978-94-007-6925-0_19, DOI 10.1007/978-94-007-6925-0_19, DOI 10.1145/2465351.2465386]
[5]
[Anonymous], 2006, P 15 C USENIX SEC S
[6]
ARM, 2014, ARM TRUSTZONE TECHN
[8]
Bacon J, 2010, LECT NOTES COMPUT SC, V6452, P293, DOI 10.1007/978-3-642-16955-7_15
[9]
Verifying computations with state
[J].
SOSP'13: PROCEEDINGS OF THE TWENTY-FOURTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES,
2013,
:341-357
[10]
Damgard Ivan, 2008, International Journal of Applied Cryptography, V1, P22, DOI 10.1504/IJACT.2008.017048