中国科学院计算技术研究所.龙芯3A处理器数据手册[R].北京:北京龙芯中科技术服务中心有限公司,2009.Institute of Computing Technology,Chinese Academy of Sciences.Godson-3 A Processor Data Book[R].Beijing:Beijing Godson Zhongke Technology Service Center Co.,Ltd(Ch).
[2]
韩佶洋.主板常用芯片及电路维修手册[M].北京:清华大学出版社,2008.HAN J Y.Motherboard Common Chip and Circuit Maintenance Manual[M].Beijing:Tsinghua University Press,2008(Ch).
张兴,沈昌祥.一种新的可信平台控制模块设计方案[J].武汉大学学报(信息科学版),2008,33(10):1011-1014.DOI:10.13203/j.whugis2008.10.007.ZHANG X,SHEN C X.A novel design of trusted platform control module[J].Geomatics and Information Science o f Wuhan University,2008,33(10):1011-1014.DOI:10.13203/j.whugis2008.10.007(Ch).
[5]
郭颖,毛军捷,张翀斌,等.基于可信平台控制模块的主动度量方法[J].清华大学学报(自然科学版),2012,52(10):1465-1473.GUO Y,MAO J J,ZHANG C B,et al.Active measures base on a trusted platform control module[J].Journal of Tsinghua University(Sci and Tech),2012,52(10):1465-1473(Ch).
[6]
黄坚会,喻剑,赵保华,等.可信平台控制模块规范[R].北京:中关村可信计算产业联盟,2016.HUANG J H,YU J,ZHAO B H,et al.Trusted Plat form Control Module Specif ication[R].Beijing:Zhongguancun Trusted Computing Industry Alliance,2016(Ch).
[7]
SHI W C.On design of a trusted software base with support of TPCM[C].Trusted Systems(LNCS6163).Berlin:Springer,2010:1-15.
[8]
黄坚会,石文昌.基于ATX主板的TPCM主动度量及电源控制设计[J].信息网络安全,2016(11):1-5.DOI:10.3969/j.issn.1671-1122.2016.11.001.HUANG J H,SHI W C.The TPCM active measurement and power control design for ATX motherboard[J].Netinfo Security,2016(11):1-5.DOI:10.3969/j.issn.1671-1122.2016.11.001(Ch).
[9]
TRUSTED COMPUTING GROUP.TPM Main Specification[EB/OL].[2011-03-01].http://www.trustedcomputing group.org/tpm-main-speci fication/.
国家密码管理局.可信计算密码支撑平台功能与接口规范:GB/T29829[S].北京:标准出版社,2013.National Password Administration.Information Security Techniques-Functionality and Interface Specification of Cryptographic Support Platform for Trusted Computing:GB/T29829-2013[S].Beijing:China Standard Press,2013(Ch).
[12]
黄坚会.TPCM平台度量及控制设计[J].信息安全研究,2017(4):310-315HUANG J H.The TPCM platform measurement and control design[J].Journal o f In f ormation Security Research,2017(4):310-315(Ch).
[13]
沈昌祥.用可信计算3.0筑牢网络安全防线[J].信息安全研究,2017(4):290-298.SHEN C X.Building cyber security defense by trusted computing 3.0[J].Journal of Information Security Research,2017(4):290-298(Ch).