共 28 条
[1]
Shen C.(2007)Survey of information Security Sci China Ser F-Inf Sci 50 273-298
[2]
Zhang H.(2006)Development of trusted computing research J Wuhan Univ (Nat Sci Ed) 52 513-518
[3]
Feng D.(2007)Ten years’ exploration for test, evaluation and certification of information security Inf Secur Comm Priv 6 5-8
[4]
Zhang H.(2009)Automated testing of the trusted platform module J Comp Res Develop 48 1839-1846
[5]
Luo J.(2009)Research on compliant testing method of trusted cryptography module J Comput 32 654-663
[6]
Jin G.(2008)An approach for compliance validation of TPM through applications J Graduate School Chinese Acad Sci. 25 649-656
[7]
Wu S.(2009)Testing on trust chain of trusted computing platform based on labeled transition system J Comput 32 635-645
[8]
Zhan J.(2008)Research on cryptology mechanism of trusted computing platform module J Comput Appl 28 1907-1915
[9]
Zhang H.(2009)The formal analysis and testing of trusted platform module J Comput 32 646-653
[10]
Li H.(2009)Compliant testing method of trusted cryptography module J Wuhan Univ (Nat Sci Ed) 55 31-34