JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (11): 82-88.doi: 10.6040/j.issn.1671-9352.2.2014.140
Previous Articles Next Articles
LÜ Meng, LIU Zhe, LIU Jian-wei
CLC Number:
[1] 张焕国, 赵波.可信计算[M]. 武汉:武汉大学出版社, 2011. ZHANG Huanguo, ZHAO Bo. Trusted computing [M]. Wuhan: Wuhan University Press, 2011. [2] 张焕国, 陈璐, 张立强. 可信网络连接研究[J]. 计算机学报, 2010, 33(1):706-717. ZHANG Huanguo, CHEN Lu, ZHANG Liqiang. Research on trusted network connection[J]. Chinese Journal of Computers, 2010, 33(1):706-717. [3] TPM T C G. Main part 1 design principles specification version 1.2[EB/OL].[2014-02-08]. http://www.trustedcomputinggroup.org. [4] Tusted Computing Group. Trusted network connect architecture for interoperability [EB/OL]. [2014-01-25].http://www. trustedcomputinggroup.org/. [5] 池亚平, 杨磊, 李兆斌, 等. 基于EAP-TLS的可信网络连接认证方案设计与实现[J]. 计算机工程与科学, 2011, 33(4):8-12. CHI Yaping, YANG Lei, LI Zhaobin, et al. Design and implementation ofan authentication scheme for trustednetwork connection based on EAP-TLS[J]. Computer Engineering & Science, 2011, 33(4):8-12. [6] XIAO P, HE J, FU Y, et al. Mutual access authentication in wireless wearable networks based on trusted platform module[J]. Journal of Convergence Information Technology, 2012, 7(7):148-156. [7] 马卓, 马建峰, 杨超, 等. 无线环境下的可信网络连接协议[J]. 北京工业大学学报, 2010, 36(5):577-581. MA Zhuo, MA Jianfeng, YANG Chao, et al. Trusted network connect protocol for wireless environment[J]. Journal of Beijing University of Technology, 2010, 36(5):577-581. [8] LI Guoqin, JIANG Yu, HU Aiqun. Study on application of TNC technology in mobile office[C]// Proceedings of International Conference on Multimedia Information Networking and Security (MINES). Los Alamitos: IEEE Computer Society, 2010: 799-803. [9] JIANG Yi, LV Weike, LIU Xiangbin. Research of trust chain improvement technology[C]// Proceedings of 2010 International Conference on Networks Security, Wireless Communications and Trusted Computing. Los Alamitos: IEEE Computer Society, 2010: 294-297. [10] BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption[C]// Proceedings of IEEE Symposium on Security and Privacy(SP'07). Los Alamitos: IEEE Computer Society, 2007: 321-334. [11] BETHENCOURT J, SAHAI A, WATERS B.Thecpabe toolkit[EB/OL].[2014-01-25].http://acsc.csl.sri.com/cpabe/. |
[1] | HUANG Yu-qing, ZHAO Bo, XIAO Yu, TAO Wei. A vTPM-VM live migration scheme based on KVM [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 69-75. |
|