-
1
-
-
0042349623
-
A trusted open platform
-
P. England, B. W. Lampson, J. Manferdelli, M. Peinado, B. Willman, A trusted open platform [J], IEEE Computer, 2003, 36 (7): 55-62.
-
(2003)
IEEE Computer
, vol.36
, Issue.7
, pp. 55-62
-
-
England, P.1
Lampson, B.W.2
Manferdelli, J.3
Peinado, M.4
Willman, B.5
-
2
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Berkley: USENIX Association
-
R. Sailer, XL Zhang, T. Jaeger, L. van Doorn, Design and implementation of a TCG-based integrity measurement architecture [C] //Proceedings of the 13th USENIX Security Symp. Berkley: USENIX Association, 2004: 223-238.
-
(2004)
Proceedings of the 13th USENIX Security Symp
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.L.2
Jaeger, T.3
van Doorn, L.4
-
4
-
-
79953070593
-
Fficient remote attestation mechanism with privacy protection
-
ZY Xu, YP He, LL Deng, fficient remote attestation mechanism with privacy protection [J], Journal of Software, 2011, 22 (2): 339-352.
-
(2011)
Journal of Software
, vol.22
, Issue.2
, pp. 339-352
-
-
Xu, Z.Y.1
He, Y.P.2
Deng, L.L.3
-
6
-
-
79957663072
-
Optimization of program behavior model for trusted computing dynamic attestation
-
Fajiang YU, Yuewei XU, Yue YU, Yang LIN, Yaohui WANG Optimization of Program Behavior Model for Trusted Computing Dynamic Attestation, Journal of Computational Information Systems, 2011, 7 (5): 1436-1445.
-
(2011)
Journal of Computational Information Systems
, vol.7
, Issue.5
, pp. 1436-1445
-
-
Yu, F.1
Xu, Y.2
Yu, Y.3
Lin, Y.4
Wang, Y.5
-
7
-
-
58349116044
-
Dynamic trustiness authentication framework based on software's behavior integrity
-
Los Alamitos, CA: IEEE Computer Society
-
Guojun Peng, Xuanchen Pan, Huanguo Zhang, Dynamic trustiness authentication framework based on software's behavior integrity [C] //Proc of the 9th Int Conf for Young Computer Scientists (ICYCS 2008), Los Alamitos, CA: IEEE Computer Society, 2008: 2283-2288.
-
(2008)
Proc of the 9th Int Conf for Young Computer Scientists (ICYCS 2008)
, pp. 2283-2288
-
-
Peng, G.1
Pan, X.2
Zhang, H.3
-
8
-
-
79959553321
-
Linux kernel integrity measurement using contextual inspection
-
New York: ACM
-
PA Loscocco, PW Wilson, JA Pendergrass, et al, Linux kernel integrity measurement using contextual inspection [C] //Proc of the 2nd ACM Workshop on Scalable Trusted Computing, New York: ACM, 2007: 21-29.
-
(2007)
Proc of the 2nd ACM Workshop on Scalable Trusted Computing
, pp. 21-29
-
-
Loscocco, P.A.1
Wilson, P.W.2
Pendergrass, J.A.3
-
9
-
-
72849116409
-
Property based attestation and trusted computing: Analysis and challenges
-
Australia: IEEE Computer Society
-
Nagarajan, Aarthi, Property based attestation and trusted computing: Analysis and challenges [C] // Proc of the 3rd International Conference on Network and System Security, Australia: IEEE Computer Society, 2009: 278-285.
-
(2009)
Proc of the 3rd International Conference on Network and System Security
, pp. 278-285
-
-
Nagarajan1
Aarthi2
-
10
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not Mechanisms
-
New York: ACM
-
AR. Sadeghi, C. Stuble, Property-based attestation for computing platforms: Caring about properties, not Mechanisms [C] //Proc of the 2004 Workshop on New Security Paradigms, New York: ACM, 2004: 67-77.
-
(2004)
Proc of the 2004 Workshop on New Security Paradigms
, pp. 67-77
-
-
Sadeghi, A.R.1
Stuble, C.2
-
11
-
-
34547196300
-
A protocol for property-based attestation
-
New York: ACM
-
Liqun Chen, R. Landfermann, H Lohr, et al, A protocol for property-based attestation [C] //Proc of the 2006 ACM Workshop on Scalable Trusted Computing, New York: ACM, 2006: 7-16.
-
(2006)
Proc of the 2006 ACM Workshop on Scalable Trusted Computing
, pp. 7-16
-
-
Chen, L.1
Landfermann, R.2
Lohr, H.3
-
12
-
-
77954683177
-
On privacy of property-based remote attestation
-
SJ LI, YP HE, DM LIU, CY YUAN, On privacy of property-based remote attestation [J], Journal on Communication, 2009, 30 (11A): 146-152.
-
(2009)
Journal on Communication
, vol.30
, Issue.11 A
, pp. 146-152
-
-
Li, S.J.1
He, Y.P.2
Liu, D.M.3
Yuan, C.Y.4
-
13
-
-
0010251473
-
Chameleon hashing and signatures
-
The Internet Society, San Diego
-
H. Krawczyk, T. Rabin, Chameleon hashing and signatures, In: Proceedings of the Network and Distributed System Security Symposium, The Internet Society, San Diego, 2000: 143-154.
-
(2000)
Proceedings of the Network and Distributed System Security Symposium
, pp. 143-154
-
-
Krawczyk, H.1
Rabin, T.2
-
16
-
-
26844519980
-
Efficient certificate revocation system implementation: Huffman merkle hash tree (HuffMHT)
-
JL. Munoz, J. Forne, O. Esparza, et al, Efficient certificate revocation system implementation: Huffman merkle hash tree (HuffMHT) [J], Springer-Verlag Berlin Heidelberg, LNCS, 2005: 119-127.
-
(2005)
Springer-Verlag Berlin Heidelberg
, pp. 119-127
-
-
Munoz, J.L.1
Forne, J.2
Esparza, O.3
-
17
-
-
70350614452
-
Adaptive huffman tree scheme for multicast rekeying
-
Haitao Xie, YumingWang, Zongkai Yang, Shouzhi Xu, Adaptive Huffman tree scheme for multicast rekeying [J], Journal of Huazhong University of Science and Technology (Nature Science Edition), 2009, (9): 33-36.
-
(2009)
Journal of Huazhong University of Science and Technology (Nature Science Edition)
, Issue.9
, pp. 33-36
-
-
Xie, H.1
Zongkai, Y.2
Yang3
Xu, S.4
-
18
-
-
84866551098
-
Huffman-based certificate revocation tree
-
Yuan XUE, Yong-bin ZHOU, Jian-feng GUO, Xi-zhen NI, Huffman-based certificate revocation tree [J], Journal on Communication, 2005, 26 (2): 45-50.
-
(2005)
Journal on Communication
, vol.26
, Issue.2
, pp. 45-50
-
-
Xue, Y.1
Zhou, Y.-B.2
Guo, J.-F.3
Ni, X.-Z.4
|