2Wang Xiaoyun. Feng Dengguo, Lai Xuejia, et al. Collisions for hash functions MD4, MDS, HAVAL-128 and RIPEMD[C]. Cryptology ePrint Archive: Report 2004/1999, Aug. 2004.
3Wang Xiaoyun Lai Xuejia, Feng Dengguo, et al. Cryptanalysis of the hash function MD4 and RIPEMD[C].In:Advance in Cryptology-Eurocrypt' 05, LNCS 3494. Berlin: Springer-Verlag, 2005.1 - 18.
4Wang Xiaoyun Yu Hongbo. How to break MD5 and other hash functions[C] In. Advance in Cryptology-Eurocrypt' 05, LNCS 3494. Berlin: Springer-Verlag, 2005:19-35.
6Wang Xiaoyun, Yin Yiqun Lisa Yu Hongbo. Finding collisions in the full SHA-I[C]. In:Advance in Cryptology Crypto 05, LNCS 3621, Berlin: Springer-Verlag, 2005:17-36.
4Oleg Sheyner,Joshua Haines,Somesh Jha,et al.Automated generation and analysis of attack graphs. Proceedings of the 2002 IEEE Symposium on Security and Privacy . 2002
5Ahmad-Reza Sadeghi,Christian Stuble.Property-based attesta-tion for computing platforms:Caring about properties,not mec-hanisms. New Security Paradigms Workshop . 2004
6LOSCOCCO P A,WILSON P W,PENDERGRASS J A,et al.Linuxkernel integrity measurement using contextual inspection. Proc ofACM Workshop on Scalable Trusted Computing . 2007
7DAVI L,SADEGHI A R,WINANDY M.Dynamic integrity measure-ment and attestation:towards defense against return-oriented program-ming attacks. Proc of ACM Workshop on Scalable Trusted Com-puting . 2009
8Haldar V,Chandra D,Franz M.Semantic remote attestation:avirtual machine directed approach to trusted computing. theThird virtual Machine Research and Technology Symposium (VM’’’’04) . 2004
9Design and Implementation of a TCG-based Integrity Measurement Architecture. 13th Usenix Security Symposium . 2004
10Liang Gu,Xuhua Ding,Robert H Deng,Yanzhen Zou,Bing Xie,Weizhong Shao,Hong Mei.Model-Driven Remote Attestation:Attesting Remote System from Behavioral Aspect. Proceedings on the 9th international Conference for Young Computer Scientists . 2008