[1] Chaum D. Blind signatures for untraceable payments //Proceedings of Crypto'82. Springer-Verlag, 1982:199-203.
[2] Chaum D,Fiat A, Naor N. Untraceable electronic cash //Proceedings of Crypto'88.1988:319-327.
[3] Frankel M, Yung M. Secure and Efficient off-line digital money //Proceeding of the Twentith International Colloquium on Automata, Languages and Programming (ICALP 1993). Lund, Sweden: Springer-Verlag, 1993:265-276.
[4] Ferguson N. Single term off-line coins //Advances in Cryptology, Proc of Eurocrypt'93.Loflhus, Norway: Springer-Verlag, 1993:318-328.
[5] Brands S. Untraceable off-line cash in wallets with observers //Advances in Cryptology-CRYPTO'93,LNCS 773.Springer-Verlag, 1993:302-318.
[6] Brands S. Off-line electronic cash based on secret-key certificates //Proceedings of LATIN'95,Also available as CWI Technical Report. CSR9506,1995.
[7] Jens Bo Friis. Digicash implementation [M].Cryptology University of Aarhus, 2003.
[8] Jaeger T, Sailer R, Shankar U. PRIMA: policy-reduced integrity measurement architecture //Proceeding of ACM Symposium on Access Control Models and Technologies (SACMAT).California,2006:19-28.
[9] Zhang X W, Chen S Q,Michael J,et al. SecureBus: towards transparent application-level trusted computing with mandatory access control //Proceedings of ACM Symposium on Information, Computer, and Communication Security (AsiaCCS).Singapore, 2007:117-126.
[10] Zhang H G, Luo J,Jin G,et al.Development of trusted computing research [J].Journal of Wuhan University(Natural Science),2006,52(5):513-518(in Chinese). 张焕国,罗 捷,金 刚,等.可信计算研究进展 [J].武汉大学学报:理学版,2006,52(5):513-518.
[11] TPM Main Part 1, Design Principles Specification, Version 1.2 Revision 62 . (2003-10-02) . https://www.trustedcomputinggroup.org/home.
[12] TCG Trusted Network Connect,TNC Architecture for Interoperability Specification Version 1.0, Revision 4 . (2005-05-03) . https://www.trustedcomputinggroup.org/home.
[13] TCG Specification, Architecture Overview Specification, Revision 1.2 . (2004-04-28) . https://www.trustedcomputinggroup.org/home.
[14] TPM Main Part 3 Commands Specification, Version 1.2, Level 2 Revision 85 . (2005-02-13) . https://www.trustedcomputinggroup.org/home.
[15] Okamoto T. Practical identification schemes as secure as the DL and RSA problems . . http://grouper.ieee.org/groups/1363/addendum.html#Okamoto, March 1999.
[16] Okamoto T. Provably secure and practical identification schemes and corresponding signature schemes //Proceedings of Crypto'92, LNCS 740.Springer-Verlag,1993:31-53.
|