You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
191 lines
5.3 KiB
191 lines
5.3 KiB
@article{schnorr91,
|
|
author = {Schnorr, Claus},
|
|
year = {1991},
|
|
month = {01},
|
|
pages = {161-174},
|
|
title = {Efficient signature generation by smart cards},
|
|
volume = {4},
|
|
journal = {Journal of Cryptology},
|
|
doi = {10.1007/BF00196725}
|
|
}
|
|
|
|
@article{cramer98,
|
|
author = {Cramer, R. and Shoup, V.},
|
|
year = {1998},
|
|
month = {01},
|
|
pages = {},
|
|
title = {A practical public-key cryptosystem secure against adaptive chosen ciphertexts attacks}
|
|
}
|
|
|
|
@inproceedings{camenisch04,
|
|
author = {Camenisch, Jan and Lysyanskaya, Anna},
|
|
year = {2004},
|
|
month = {08},
|
|
pages = {56-72},
|
|
title = {Signature Schemes and Anonymous Credentials from Bilinear Maps},
|
|
volume = {3152/2004},
|
|
journal = {Signature Schemes and Anonymous Credentials from Bilinear Maps},
|
|
doi = {10.1007/978-3-540-28628-8_4}
|
|
}
|
|
|
|
@inproceedings{camenisch16,
|
|
author = {Camenisch, Jan and Drijvers, Manu and Lehmann, Anja},
|
|
year = {2016},
|
|
month = {03},
|
|
pages = {234-264},
|
|
title = {Universally Composable Direct Anonymous Attestation},
|
|
volume = {9615},
|
|
isbn = {978-3-662-49386-1},
|
|
doi = {10.1007/978-3-662-49387-8_10}
|
|
}
|
|
|
|
@inproceedings{barreto05,
|
|
author = {Barreto, Paulo and Naehrig, Michael},
|
|
year = {2005},
|
|
month = {08},
|
|
pages = {319-331},
|
|
title = {Pairing-Friendly Elliptic Curves of Prime Order},
|
|
volume = {3897},
|
|
journal = {LNCS},
|
|
doi = {10.1007/11693383_22}
|
|
}
|
|
|
|
@inproceedings{chen10,
|
|
author = {Chen, Liqun and Page, Dan and Smart, Nigel},
|
|
year = {2010},
|
|
month = {11},
|
|
pages = {223-237},
|
|
title = {On the Design and Implementation of an Efficient DAA Scheme},
|
|
doi = {10.1007/978-3-642-12510-2_16}
|
|
}
|
|
|
|
@inproceedings{camenisch17,
|
|
author = {Camenisch, Jan and Chen, Liqun and Drijvers, Manu and Lehmann, Anja and Novick, David and Urian, Rainer},
|
|
year = {2017},
|
|
month = {05},
|
|
pages = {901-920},
|
|
title = {One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation},
|
|
doi = {10.1109/SP.2017.22}
|
|
}
|
|
|
|
@article{winkler11,
|
|
author = {Winkler, Thomas and Rinner, Bernhard},
|
|
year = {2011},
|
|
month = {01},
|
|
pages = {},
|
|
title = {Securing Embedded Smart Cameras with Trusted Computing},
|
|
volume = {2011},
|
|
journal = {EURASIP J. Wireless Comm. and Networking},
|
|
doi = {10.1155/2011/530354}
|
|
}
|
|
|
|
@book{arthur15,
|
|
author = {Arthur, Will and Challener, David and Goldman, Kenneth},
|
|
year = {2015},
|
|
month = {01},
|
|
pages = {},
|
|
title = {A Practical Guide to TPM 2.0},
|
|
doi = {10.1007/978-1-4302-6584-9}
|
|
}
|
|
|
|
@book{book,
|
|
author = {Proudler, Graeme and Chen, Liqun and Dalton, Chris},
|
|
year = {2014},
|
|
month = {01},
|
|
pages = {},
|
|
title = {Trusted Computing Platforms},
|
|
doi = {10.1007/978-3-319-08744-3}
|
|
}
|
|
|
|
@online{pornkitprasan19-diskencryption,
|
|
author = {Pawit Pornkitprasan},
|
|
year = {2019},
|
|
month = {07},
|
|
title = {Full Disk Encryption on Arch Linux backed by TPM 2.0},
|
|
url = {https://medium.com/@pawitp/full-disk-encryption-on-arch-linux-backed-by-tpm-2-0-c0892cab9704},
|
|
urldate = {27.02.2020}
|
|
}
|
|
|
|
@online{pornkitprasan19-tpmtools,
|
|
author = {Pawit Pornkitprasan},
|
|
year = {2019},
|
|
month = {10},
|
|
title = {Its certainly annoying that TPM2-Tools like to change their command line parameters},
|
|
url = {https://medium.com/@pawitp/its-certainly-annoying-that-tpm2-tools-like-to-change-their-command-line-parameters-d5d0f4351206},
|
|
urldate = {27.02.2020}
|
|
}
|
|
|
|
@online{pornkitprasan19-secureboot,
|
|
author = {Pawit Pornkitprasan},
|
|
year = {2019},
|
|
month = {07},
|
|
title = {The Correct Way to use Secure Boot with Linux},
|
|
url = {https://medium.com/@pawitp/the-correct-way-to-use-secure-boot-with-linux-a0421796eade},
|
|
urldate = {27.02.2020}
|
|
}
|
|
|
|
@online{tevora18,
|
|
author = {Tevora},
|
|
year = {2018},
|
|
month = {06},
|
|
title = {Configuring Secure Boot + TPM 2},
|
|
url = {https://threat.tevora.com/secure-boot-tpm-2/},
|
|
urldate = {27.02.2020}
|
|
}
|
|
|
|
@online{smith18-dealing-sb,
|
|
author = {Rod Smith},
|
|
year = {2018},
|
|
month = {07},
|
|
title = {Managing EFI Boot Loaders for Linux: Dealing with Secure Boot},
|
|
url = {https://www.rodsbooks.com/efi-bootloaders/secureboot.html},
|
|
urldate = {27.02.2020}
|
|
}
|
|
|
|
@online{smith18-controlling-sb,
|
|
author = {Rod Smith},
|
|
year = {2018},
|
|
month = {07},
|
|
title = {Managing EFI Boot Loaders for Linux: Controlling Secure Boot},
|
|
url = {https://www.rodsbooks.com/efi-bootloaders/controlling-sb.html},
|
|
urldate = {27.02.2020}
|
|
}
|
|
|
|
@online{corbet16,
|
|
author = {Jonathan Corbet},
|
|
year = {2016},
|
|
month = {02},
|
|
title = {Protecting systems with the TPM},
|
|
url = {https://lwn.net/Articles/674751/},
|
|
urldate = {27.02.2020}
|
|
}
|
|
|
|
@online{kernelsecurity18,
|
|
author = {},
|
|
year = {2018},
|
|
month = {03},
|
|
title = {Linux Kernel Integrity},
|
|
url = {https://kernsec.org/wiki/index.php/Linux_Kernel_Integrity},
|
|
urldate = {27.02.2020}
|
|
}
|
|
|
|
@inproceedings{chevalier19,
|
|
author = {Chevalier, Ronny and Cristalli, Stefano and Hauser, Christophe and Shoshitaishvili,
|
|
Yan and Wang, Ruoyu and Kruegel, Christopher and Vigna, Giovanni and Bruschi, Danilo and Lanzi,
|
|
Andrea},
|
|
year = {2019},
|
|
month = {03},
|
|
pages = {315-325},
|
|
title = {BootKeeper: Validating Software Integrity Properties on Boot Firmware Images},
|
|
doi = {10.1145/3292006.3300026}
|
|
}
|
|
|
|
@inproceedings{butterworth13,
|
|
author = {Butterworth, John and Kallenberg, Corey and Kovah, Xeno and Herzog, Amy},
|
|
year = {2013},
|
|
month = {11},
|
|
pages = {25-36},
|
|
title = {BIOS chronomancy: Fixing the core root of trust for measurement},
|
|
journal = {Proceedings of the ACM Conference on Computer and Communications Security},
|
|
doi = {10.1145/2508859.2516714}
|
|
}
|