参考文献[1]肖敬,喻超,毋国庆.一种基于嵌入式安全系统的可信计算机系统[J].计算机工程,2006,32(13):246-247,279. [2]王博,李波,高振铁.基于TPM的嵌入式可信计算平台设计[J].单片机与嵌入式系统应用,2011,11(1):13-15. [3]Potter B.High Time for Trusted Computing[J].Security & Privacy,2009,7(6):54-56. [4]Goh W,Yeo C K.Teaching an Old TPM New Tricks:Repurposing for Identity-based Signatures[J].Security & Privacy,2013,11(5):28-35. [5]刘海雷,王震宇,马鸣锦,等.嵌入式可信终端TPM接口的研究与实现[J].计算机工程与设计,2008,29(13):3316-3319. [6]David C,Ryan C.可信计算[M].赵波,译.北京:机械工业出版社,2009. [7]Rahmatian M,Kooti H,Harris I G,et al.Hardware-assisted Detection of Malicious Software in Embedded Systems[J].Embedded Systems Letters,2012,4(4):94-97. [8]Schaumont P,Raghunathan A.Guest Editors’ Introduction:Security and Trust in Embedded-systems Design[J].Design & Test of Computers,2007,24(6):518-520. [9]Zhang Huanguo,Mu Yi.Trusted Computing and Infor-mation Security[J].Communications,2013,10(11). [10]Oliveira D P R,Andreia F M L,Delisandra F V,et a1.Energy Consumption Analysis of the Cryptographic Key Generation Process of RSA and ECC Algorithms in Embedded Systems[J].Latin America Transactions,2014,12(6):1141-1148. [11]Herzog J.Applying Protocol Analysis to Security Device Interfaces[J].Security & Privacy,2006,4(4):84-87. [12]徐明迪,杨连嘉.嵌入式实时操作系统可信计算技术研究[J].计算机工程,2014,40(1):130-133. 编辑刘冰 |