[1] 沈昌祥.用可信计算3.0筑牢网络安全防线[J].信息通信技术,2017,11(03):4-6
[2] Lawrence J J. Use mathematical modeling to give your TPM implementation effort an extra boost[J]. Journal of Quality in Maintenance Engineering, 1999, 5(1):62-69
[3] Benhani E M, Bossuet L, Aubert A. The Security of ARM TrustZone in a FPGA-based SoC[J]. IEEE Trans. on Computers, 2019.68(8):1238-1248
[4] McKeen F, Alexandrovich I, Anati I, et al. Intel® software guard extensions (intel® sgx) support for dynamic memory management inside an enclave[C]//Proceedings of the Hardware and Architectural Support for Security and Privacy 2016. ACM, 2016:10
[5] Dengguo F, Yu Q, Dan W, et al. Research on trusted computing technology[J]. Journal of Computer Research and Development, 2011, 48(8):1332-1349
[6] 国家密码管理局.信息安全技术-可信密码支撑平台功能与接口规范:GB/T29829-2013[S].北京:中国标准出版社, 2014
[7] Wang J, Shi Y, Peng G, et al. Survey on key technology development and application in trusted computing[J]. China Communications, 2016, 13(11):70-90
[8] 胡俊,沈昌祥,公备. 可信计算3.0工程初步(第二版)[M].北京:人民邮电出版社.,2018.12
[9] Toegl R , Winkler T , Nauman M , et al. Programming Interfaces for the TPM[M]// Trusted Computing for Embedded Systems. Springer International Publishing, 2015