1Trusted Computing Group.Trusted Computing Platform Alliance (TCPA) Main Specification Version 1.1b[EB/OL].http://www.trustedcomputinggroup.org,2001. 被引量:1
2Trusted Computing Group.Trusted Computing Group TPM specification Version 1.2[EB/OL].http://www.trustedcomputinggroup.org,2003. 被引量:1
3Brickell E,Camenisch J,Chen L.Direct Anonymous Attestation[A]// Proceedings of the 11th ACM Conference on Computer and Communications Security[C].ACM Press,2004:132-145. 被引量:1
4Camenisch J,Lysyanskaya A.A signature scheme with efficient protocols[A]// Proceedings of the Third International Conference on Security in Communication Networks[C].LNCS 2576,Springer-Verlag,2003:268-289. 被引量:1
5Fiat A,Shamir A.How to prove yourself:Practical solutions to identification and signature problems[A]// Advances in Cryptology-CRYPTO '86[C].LNCS 263,Springer-Verlag,1987:186-194. 被引量:1
6Trusted Computing Group.Trusted Computing Group TPM v1.2 Specification Changes A Summary of Changes with respect to the v1.1b TPM Specification[EB/OL].http://www.trustedcomputinggroup.org,2003. 被引量:1
7Camenisch J.Better Privacy for Trusted Computing Platforms[A]// Proceedings of the European Symposium on Research in Computer Security 2004[C].LNCS 3193,Springer-Verlag,2004:73-88. 被引量:1