共 4 条
[3]
Handbook of Applied Cryptography .2 Menezes A,Oorschot P V,Vanstone S. CRC Press . 1997
[4]
Better privacy for trusted computing platforms .2 Camenisch J. Proc.of the ESORICS . 2004