-
1
-
-
33749468315
-
Mobile terminal security
-
OLIVIER B, NORA D, LAURENT G. Mobile terminal security[EB/OL]. http://eprint.iacr.org/2004/158.pdf, 2005.
-
(2005)
-
-
Olivier, B.1
Nora, D.2
Laurent, G.3
-
3
-
-
4544286919
-
Privacy and authentication protocol providing anonymous channels in GSM
-
ALBERTO P. Privacy and authentication protocol providing anonymous channels in GSM[J]. Computer Communications, 2004, 27: 1709-1715.
-
(2004)
Computer Communications
, vol.27
, pp. 1709-1715
-
-
Alberto, P.1
-
4
-
-
37549067642
-
Improvement of mobile IP registration using self-certified public keys
-
DANG L J, KOU W D, ZHANG J, et al. Improvement of mobile IP registration using self-certified public keys[J]. IEEE Transactions on Mobile Computing, 2007, 1(4): 167-173.
-
(2007)
IEEE Transactions on Mobile Computing
, vol.1
, Issue.4
, pp. 167-173
-
-
Dang, L.J.1
Kou, W.D.2
Zhang, J.3
-
5
-
-
36749002169
-
Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
-
JIANG Y, LIN C, SHEN X M, et al. Mutual authentication and key exchange protocols for roaming services in wireless mobile networks[J]. IEEE Transactions on Wireless Communications, 2006, 5(9): 2569-2577.
-
(2006)
IEEE Transactions on Wireless Communications
, vol.5
, Issue.9
, pp. 2569-2577
-
-
Jiang, Y.1
Lin, C.2
Shen, X.M.3
-
6
-
-
33846349755
-
Authentication and key agreement protocols preserving anonymity
-
KUMAR M, RAJENDRA K, FU H R. Authentication and key agreement protocols preserving anonymity[J]. International Journal of Network Security, 2006, 3(3): 259-270.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.3
, pp. 259-270
-
-
Kumar, M.1
Rajendra, K.2
Fu, H.R.3
-
7
-
-
65649116341
-
An efficient authentication protocol with anonymity for wireless IP networks
-
ZHU J M, MA J F. An efficient authentication protocol with anonymity for wireless IP networks[J]. Journal on Communications, 2004, 25(6): 12-18.
-
(2004)
Journal on Communications
, vol.25
, Issue.6
, pp. 12-18
-
-
Zhu, J.M.1
Ma, J.F.2
-
8
-
-
33751105885
-
Security flaws and improvement to a wireless authentication protocol with anonymity
-
PENG H X, FENG D G. Security flaws and improvement to a wireless authentication protocol with anonymity[J]. Journal on Communications, 2006, 27(9): 78-85.
-
(2006)
Journal on Communications
, vol.27
, Issue.9
, pp. 78-85
-
-
Peng, H.X.1
Feng, D.G.2
-
9
-
-
33749482809
-
Trusted computing based user authentication for mobile equipment
-
ZHENG Y, HE D K, HE M X. Trusted computing based user authentication for mobile equipment[J]. Chinese Journal of Computers, 2006, 29(8): 1255-1264.
-
(2006)
Chinese Journal of Computers
, vol.29
, Issue.8
, pp. 1255-1264
-
-
Zheng, Y.1
He, D.K.2
He, M.X.3
-
10
-
-
21644486314
-
TCG specification architecture overview
-
Trusted computing group
-
Trusted computing group. TCG specification architecture overview[EB/OL]. http://www.trustedcomputinggroup.org, 2007.
-
(2007)
-
-
-
11
-
-
24944506569
-
Trusted computing: Strengths, weaknesses and further opportunities for enhancing privacy
-
iTrust 2005, LNCS 3477
-
PEARSON S. Trusted computing: strengths, weaknesses and further opportunities for enhancing privacy[A]. iTrust 2005, LNCS 3477[C]. 2005. 305-320.
-
(2005)
, pp. 305-320
-
-
Pearson, S.1
-
12
-
-
23844501750
-
Trusted computing-path to security or road to servitude
-
SARAH H. Trusted computing-path to security or road to servitude?[J]. Infosecurity Today, 2004, 1(4): 18-21.
-
(2004)
Infosecurity Today
, vol.1
, Issue.4
, pp. 18-21
-
-
Sarah, H.1
-
13
-
-
23444451451
-
Trusted computing and open source
-
Information Security Technical Report
-
DAVID S, MIMI Z. Trusted Computing and Open Source[R]. Information Security Technical Report, 2005. 74-82.
-
(2005)
, pp. 74-82
-
-
David, S.1
Mimi, Z.2
-
14
-
-
23444450925
-
Trusted computing group history
-
Information Security Technical Report
-
BRIAN B. Trusted Computing Group History[R]. Information Security Technical Report, 2005. 59-62.
-
(2005)
, pp. 59-62
-
-
Brian, B.1
-
15
-
-
46449092367
-
Survey of information security
-
SHEN C X, ZHANG H G, FENG D G, et al. Survey of information security[J]. Science in China (Information Sciences), 2007, 37(2): 129-150.
-
(2007)
Science in China (Information Sciences)
, vol.37
, Issue.2
, pp. 129-150
-
-
Shen, C.X.1
Zhang, H.G.2
Feng, D.G.3
-
16
-
-
46449126152
-
Development of trusted computing research
-
ZHANG H G, LUO J, JIN G, et al. Development of trusted computing research[J]. Journal of Wuhan University (Natural Science Edition), 2006, 52(5): 513-518.
-
(2006)
Journal of Wuhan University (Natural Science Edition)
, vol.52
, Issue.5
, pp. 513-518
-
-
Zhang, H.G.1
Luo, J.2
Jin, G.3
-
17
-
-
20444411497
-
Research on trustworthy networks
-
LIN C, PENG X H. Research on trustworthy networks[J]. Chinese Journal of Computers, 2005, 28(5): 751-758.
-
(2005)
Chinese Journal of Computers
, vol.28
, Issue.5
, pp. 751-758
-
-
Lin, C.1
Peng, X.H.2
-
18
-
-
70350559847
-
TPM main specifications - Part 1. Design principles
-
Trusted computing group
-
Trusted computing group. TPM main specifications-part 1 design principles[EB/OL]. http://www.trustedcomputinggroup.org, 2007.
-
(2007)
-
-
-
19
-
-
70350556613
-
Trusted computing platform alliance (TCPA) main specification
-
Trusted computing group
-
Trusted computing group. Trusted computing platform alliance (TCPA) main specification[EB/OL]. http://www.trustedcomputinggroup.org, 2001.
-
(2001)
-
-
-
20
-
-
0003629991
-
Secure hash standard (SHA-1)
-
FIPS PUB 180-1
-
Secure Hash Standard (SHA-1)[S]. FIPS PUB 180-1; 1995.
-
(1995)
-
-
-
23
-
-
70350531758
-
TCG PC client specific implementation specification for conventional BIOS
-
Trusted computing group
-
Trusted computing group. TCG PC client specific implementation specification for conventional BIOS[EB/OL]. http://www.trustedcomputinggroup.org, 2005.
-
(2005)
-
-
-
24
-
-
14844295011
-
Direct anonymous attestation
-
New York, NY, USA
-
BRICKELL E, CAMENISCH J, CHEN L Q. Direct anonymous attestation[A]. Proceedings of the 11th ACM Conference on Computer and Communications Security[C]. New York, NY, USA, 2004. 132-145.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.Q.3
|