[1]Yang Xia,Lei Lin,Wu Xin-yong. Research on the trusted-boot technology using digital signature technique[J]. Journal of University of Electronic Science and Technology of China,2016,45(3):448-452.(in Chinese)
[2]Cai Yi,Zuo Xiao-dong. Trusted computing platform for virtualization technology [J]. China Information Security,2013(6):77-79.(in Chinese)
[3]Jin Gang,Zheng Zhi-rong,Gu Yan. Security architecture of information sharing environment [J]. Ship Electronic Engineering,2013,33(5):107-109.(in Chinese)
[4]Zhang Huan-guo,Li Jing,Pan Dan-ling, et al. Trusted platform module in embedded system [J]. Journal of Computer Research and Development,2011,48(7):1269-1278.(in Chinese)
[5]Feng Deng-guo,Qin Yu,Wang Dan, et al. Research on trusted computing technology [J]. Journal of Computer Research and Development,2011,48(8):1332-1349.(in Chinese)
[6]Trusted Computing Group. Definition of trusted computing[EB/OL].[2013-09-01].http://www.trustedcomputinggroup.org/trusted_computing.
[7]Shen Chang-xiang,Zhang Huan-guo,Wang Huai-min, et al. Research and development of trusted computing [J]. Science SINICA iInformations,2010,40(2):139-166.(in Chinese)
[8]Trusted Computing Group.TCG_1 _4 _architecture_overview[EB/OL].[2013-09-01]. http://www.trustedcomputinggroup.org/trusted_computing.
[9]Felter W,Ferreira A,Rajamony R,et al. An updated performance comparison of virtual machines and Linux containers[C]∥Proc of IEEE International Symposium on Performance Analysis of Systems and Software, 2015:171-172.
[10]Gentoo wiki.about Gentoo [EB/OL]. [2016-02-18]. https://www.gentoo.org/get-started/about/.
[11]OSCCA. Public key cryptographic algorithm SM2 based on elliptic curves[EB/OL]. [2010-12-17].http://www.oscca.gov.cn/News/201012/News_1197.htm. (in Chinese)
[12]OSCCA. SM3 cryptographic hash algorithm [EB/OL]. [2010-12-17]. http://www.oscca.gov.cn/News/201012/News_1199.htm.(in Chinese)
[13]Wei Hang, Cui Hui-li, Lü Xiao-qing. Differential-algebraic analysis of SMS4 block cipher algorithm [J].Journal of Chengdu University(Natural Science Edition),2012,31(2):158-160.(in Chinese)
附中文参考文献:
[1]杨霞,雷林,吴新勇. 采用数字签名技术的可信启动方法研究[J]. 电子科技大学学报,2016,45(3):448-452.
[2]蔡谊,左晓栋. 面向虚拟化技术的可信计算平台研究[J]. 信息安全与通信保密,2013(6):77-79.
[3]金刚,郑志蓉,顾燕. 虚拟化环境下的可信计算机制应用研究[J]. 舰船电子工程,2013,33(5):107-109.
[4]张焕国,李晶,潘丹铃,等. 嵌入式系统可信平台模块研究[J]. 计算机研究与发展,2011,48(7):1269-1278.
[5]冯登国,秦宇,汪丹,等. 可信计算技术研究[J]. 计算机研究与发展,2011,48(8):1332-1349.
[7]沈昌祥,张焕国,王怀民,等. 可信计算的研究与发展[J]. 中国科学(信息科学),2010,40(2):139-166.
[11]国家密码管理局. SM2椭圆曲线公钥密码算法[EB/OL]. [2010-12-17]. http://www.oscca.gov.cn/News/201012/News_1197.htm.
[12]国家密码管理局. SM3密码杂凑算法[EB/OL]. [2010-12-17].http://www.oscca.gov.cn/News/201012/News_1199.htm.
[13]魏航,崔会丽,吕晓庆. SMS4分组密码算法的差分一代数分析[J]. 成都大学学报(自然科学版),2012,31(2):158-160. |