[1]Trusted Computing Group(TCG). TCG applications[OL].[20160707]. http:www.trustedcomputinggroup.org developers[2]冯登国, 秦宇, 汪丹, 等. 可信计算技术研究[J]. 计算机研究与发展, 2011, 48(8): 13321349[3]沈昌祥, 张焕国, 王怀民, 等.可信计算的研究与发展[J].中国科学: 信息科学, 2010, 40(2): 139166[4]张焕国, 赵波. 可信计算[M]. 武汉: 武汉大学出版社, 2011[5]冯登国. 可信计算——理论与实践[M]. 北京: 清华大学出版社, 2013[6]罗东俊. 基于可信计算的云计算安全若干关键问题研究[D]. 广州: 华南理工大学, 2014[7]Feng D, Qin Y, Feng W, et al. The theory and practice in the evolution of trusted computing[J]. Chinese Science Bulletin, 2014, 59(32): 41734189[8]Anwar W, Lindskong D, Zavarsky P, et al. Redesigning secure element access control for NFC enabled android smartphones using mobile trusted computing[C] Proc of Int Conf on Information Society (iSociety). Piscataway, NJ: IEEE, 2013: 2734[9]Trusted Computing Group(TCG). TCG credential profiles for TPM family 1.2; level 2(Revision 8)[EBOL]. (20130703)[20150908]. http:www.trusted computinggroup.orgfilesstatic_page_filesA55529C51A4BB294D0A5A400 E1EDE13ACredential_Profiles_V1.2_Level2_Revision8.pdf[10]Trusted Computing Group(TCG). Summary of features under consideration for the next generation of TPM[EBOL]. [20150908]. http:www.trustedcomputing group.orgresourcessummary_of_features_under_consideration_for_the_next_generation_of_tpm[11]国家密码管理局. 可信计算密码支撑平台功能与接口规范[EBOL]. (20071201)[20151008]. http:www.oscca.gov.cnUpFileFile64.PDF[12]Shen C X, Zhang H G, Wang H M, et al. Research on trusted computing and its development[J]. Science China: Information Sciences, 2010, 53(3): 405433[13]Pearson S. Trusted computing platforms, the next security solution[ROL]. (20020801)[20151228]. http:www.hpl.hp.comtechreports2002HPL2002221.pdf[14]Will A, David C, Kenneth G. Platform Security Technologies That Use TPM 2.0—Using the New Trusted Platform Module in the New Age of Security[M]. New York: Apress(Open Access), 2015[15]Hailun T, Wen H, Sanjay J. A remote attestation protocol with trusted platform modules (TPMs) in wireless sensor networks[J]. Security and Communication Networks, 2015, 8(13): 21712188[16]Liu Y, Jin Z. SAEW: A security assessment and enhancement system of wireless local area networks (WLANs)[J]. Wireless Personal Communications, 2015, 82(1): 119[17]Patil P A, Vani N S. A securityfor trusted cloud computing[J]. International Journal of Management, IT and Engineering, 2015, 5(4): 322329[18]张焕国, 何炎详, 赵波, 等. 我国可信计算研究与发展[J]. 中国计算机学会通讯, 2010: 6(2): 1019[19]罗军舟, 金嘉晖, 宋爱波, 等. 云计算: 体系结构与关键技术[J]. 通信学报, 2011, 32(7): 321[20]EPoSS. Internet of things in 2020: A roadmap for the future[EBOL]. (20080909)[20160802]. http:www.smartsystemsintegration.orgpublicinternetofthings
|