共 22 条
[1]
[Anonymous], 2010, CCSW 10
[2]
Arbaugh W.A., 1997, IEEE COMP SOC C SEC
[3]
BakerHostetler, 2014, INT COMP DAT PRIV LA
[4]
Edge J., CHARACTER DEVICES US
[5]
Futral W., 2013, INTEL TRUSTED EXECUT
[6]
Jayaram K. R., 2014, MIDDLEWARE
[7]
Architecture for protecting critical secrets in microprocessors
[J].
32nd International Symposium on Computer Architecture, Proceedings,
2005,
:2-13
[8]
McKeen F., 2013, HASP ISCA, V13, P10, DOI DOI 10.1145/2487726.2488368
[9]
NIST, 2012, TUST GEOL C IN PRESS
[10]
Reshetova E., BOOTSTRAPPING POLICI