1 |
Ronald Cramer, "Signature Schemes based on the Strong RSA Assumption," ACM TISSEC Vol.3, No.3, pp. 161-185, 2000
DOI
|
2 |
A. Shamir, "How to Share a Secret," Communication of the ACM, Vol.22, No.11, pp. 612-613, 1979
DOI
ScienceOn
|
3 |
Mario Strasser, "Software-based TPM Emulator for Linux," 2004
|
4 |
Roger Zimmerann, et al., "IBM Direct Anonymous Attestation Tools-TPM Test Suite" Release 1.2.20, 2005
|
5 |
TCG, TCG Specification Architecture Overview Specification Rev. 1.3, 2007
|
6 |
E. Brickell, et al., "Direct anonymous attestation," In Proc. of the 11th ACM Conf on Computer and Communications Security, ACM Press, 2004
|
7 |
Shafi Goldwasser, et al., "The knowledge complexity of interactive proof-systems," SIAM Journal on Computing Archive, Vol.18, pp. 186-208, 1989
DOI
ScienceOn
|
8 |
박선호, 디지털 신호처리의 기초와 DSP 응용실무, 국제테크노정보연구소, 2002
|