期刊文献+

Atbm:一种新的基于TPM的软件保护模型

下载PDF
导出
摘要 基于TPM给出了一种新的软件保护模型,使用可信计算技术在软件加密的基础上,着重考虑了软件代码的完整性校验和真实性校验。模型具有较好的防拷贝性和防篡改性,能够很好的实现软件版权的保护。
作者 熊云川 张华
出处 《黑龙江科技信息》 2008年第5期74-74,共1页 Heilongjiang Science and Technology Information
  • 相关文献

参考文献4

二级参考文献18

  • 1Stytz M R, Whittaker J A. Software protection: security's last stand? [J]. IEEE Magazine on Security & Privacy, 2003, 1( 1 ) : 95-98.
  • 2Zambreno J, Choudhary A, Sirnha R, et al. Flexible software protection using hardware/software codesign techniques [A].In: Proc of 2004 Europe Conf and Exhibition on Design, Automation and Test[C]. Paris: IEEE Press, 2004. 636-641.
  • 3Trusted Computing Platform Alliance (TCPA). Main specification version 1. lb [ DB/OL]. http://www.transtedcomputlnggroup, org/specs/tmp/tcpa_main_tcg..archltecture_vl_lb, gdf, 2005-04-01.
  • 4TCG. Trusted computing group [ DB/OL]. http ://www. trustedcomput/nggroup, org, 2004-12-01.
  • 5TCG. TCG 1 0 architecture_ overview [ DB/OL ]. http ://www. trustedcomputinggroup, org/downloada/TCG_ 1 _0_Architecture_Overview. pdf, 2005-02-12.
  • 6DRM. Trusted computing and operating system architecture[ DB/OL]. http://crpit, com/confpapers/CRPITV44Reid, pdf,2005 -03 -02.
  • 7TPM main part 2 : TPM structures [ DB/OL]. https ://www. trustedcomputinggroup, org/downloads/tpmwgmainrev62_ParO._TPM_Structures, 2004-12-01.
  • 8Evers J. Microsoft revisits NGSCB security plan [ DB/OL ]. http ://www. infowodd, com/article/04/05/05/HNngsc_ 1.html, 2005-03-05.
  • 9Shimizu A, Horioka T, Inagaki H. A password authentication method for contents communication on the Intemet[J].IEICE Trans on Comm, 1998, E812B(8) :1 666-1 673.
  • 10Manjula S, Akihiro S, Matu-tarow N. Simple and secure password authentication protocol [ J ]. IEICE Trans on Comm,2000, 83-B(6) : 1 363-1 365.

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部