共 9 条
[1]
[Anonymous], 2010, OSDI
[2]
[Anonymous], 2009, NATL I STAND TECHNOL, DOI DOI 10.6028/NIST.SP.800-145
[3]
HyperSentry: Enabling Stealthy In-context Measurement of Hypervisor Integrity
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:38-49
[4]
Barmouta A., 2003, P 17 INT S PAR DISTR
[6]
An efficient identity-based short signature scheme from bilinear pairings
[J].
CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS,
2007,
:725-+
[7]
Medvinsky G., 1993, Proceedings of the 1st ACM Conference on Computer and Communications Security, P102
[8]
Shamir A., 1985, WORKSHOP THEORY APPL, V196, P47, DOI [10.1007/3-540-39568-7_5, 10.1007/3-540-39568-75]
[9]
*TRUST COMP GROUP, TPM SPEC VERS 1 2