参考文献
[1] Paul E. Practical Techniques for Operating System Attest- ation[C]//Proceedings of the 1st International Conference on Trusted Computing and Trust in Information Technologies. Villach, Austria: Springer-Verlag, 2008: 258-264.
[2] Sailer R, Zhang X L, Jaeger T, et al. Design and Implement- ation of a TCG-based Integrity Measurement Architecture[C]// Proceedings of the 13th USENIX Security Symposium. San Diego, USA: [s. n.], 2004: 168-175.
[3] Jaeger T, Sailer R, Shankar U. PRIMA: Policy Reduced Integrity Measurement Architecture[C]//Proceedings of the 11th ACM Symposium on Access Control Models and Technologies. New York, USA: ACM Press, 2006: 336-345.
[4] Alsouri S, Dagdelen O, Katzenbeisser S. Group-based Attest- ation: Enhancing Privacy and Management in Remote Attestation[C]//Proceedings of the 3rd International Conf- erence on Trust and Trustworthy Computing. Berlin, Germany: Springer-Verlag, 2010: 541-547.
[5] 徐梓耀, 贺也平, 邓灵莉. 一种保护隐私的高效远程验证机制[J]. 软件学报, 2011, 22(2): 339-352.
[6] Gu Liang, Ding Xuhua, Deng Huijie, et al. Remote Attestation on Program Execution[C]//Proceedings of 2008 ACM Workshop on Scalable Trusted Computing. New York, USA: ACM Press, 2008: 165-178.
[7] Peng Guojun. Dynamic Trustiness Authentication Framework Based on Software’s Behavior Integrity[C]//Proceedings of the 9th International Conference on Young Computer Scientists. Zhangjiajie, China: [s. n.], 2008: 266-271.
[8] Loscocco P A, Wilson P W, Pendergrass J A, et al. Linux Kernel Integrity Measurement Using Contextual Inspection[C]// Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing. New York, USA: ACM Press, 2007: 158-164.
[9] 谢海涛, 王玉明, 杨宗凯, 等. 自适应Huffman树组密钥更新方案[J]. 华中科技大学学报: 自然科学版, 2009, 37(9): 33-36.
[10] 付东来, 彭新光, 陈够喜, 等. 一种高效的平台配置远程证明机制[J]. 计算机工程, 2012, 38(7): 25-27.
[11] 付东来, 彭新光, 陈够喜, 等. 动态Huffman树平台配置远程证明方案[J]. 计算机应用, 2012, 32(8): 2275-2279, 2282.
[12] Sun Yipin, Feng Zhenqian, Hu Qiaolin. An Efficient Distributed Key Management Scheme for Group-signature Based Anonymous Authentication in VANET[J]. Security and Communication Networks, 2012, 5(1): 79-86.
编辑 索书志 |