共 50 条
- [1] Formal analysis of TPM2.0 key management APIs [J]. CHINESE SCIENCE BULLETIN, 2014, 59 (32): : 4210 - 4224
- [2] Formal analysis of TPM2.0 key management APIs [J]. Science Bulletin, 2014, 59 (32) : 4210 - 4224
- [4] Runtime Firmware Product Lines Using TPM2.0 [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017, 2017, 502 : 248 - 261
- [6] Provable Security in Quantum Cryptography [J]. IT-INFORMATION TECHNOLOGY, 2007, 49 (02): : 127 - 130
- [7] On provable security for conventional cryptography [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 1 - 16
- [8] Cryptography and the methodology of provable security [J]. APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2003, 2643 : 1 - 5
- [9] Fundamental problems in provable security and cryptography [J]. PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2006, 364 (1849): : 3215 - 3230
- [10] TPM2.0 Key Migration-protocol Based on Duplication Authority [J]. Ruan Jian Xue Bao/Journal of Software, 2019, 30 (08): : 2287 - 2313