|
[1]陳文欽. BIOS Inside BIOS 研發技術剖析. In IEEE ICMCS, 1999. [2]I. T. AG. Trusted Platform Module Confidential. In TPM SLB 9635 TT 1.2, 2005. [3]AMI. AMI CORE8-datasheet. In http://www.ami.com.tw/support/doc/amibios8datasheet.pdf, 2005. [4]AMI. AMIBIOS8 checkpoint and beep code. 2006. [5]Curtis E. Stevens. ATA8-ACS. In At Attachment-8 ATA/ATAPI Command Set(ATA8-ACS), 2006. [6]Eric Young. Protector Suite Ql. In TouchChip Protector Suite, pages 7–42, 2005. [7]Henry E.R. Classification and Uses of Fingerprints. In Routledge,London, 1900. [8]Hollingum J. Automated FIngerprint Analysis Offers Fast Verification. In Sensor Review, pages 12–15, 1992. [9]Intel Corporation. Intel I/O Controller Hub7(ICH7) Family. In Intel 82801GB ICH7 and 82801GR ICH7R I/O Controller Hubs, pages 136–138, 2005. [10]International Biometric Group. Finger Scan Technology Report. In http://www.fingerscan.com/, 2002. [11]Mehtre B.M. Fingerprint Image Analysis for Automatic Identification. In Machine Vision and Applications, pages 124–139, 1993. [12]Scott Harper and Peter Athanas. A Security Policy Based upon Hardware Encryption. 2004. [13]SecuGen Corporation. Fingerprint Sensor Module. In http://www.secugen.com/products/sensor.htm, 2002. [14]Sherlock B.G and Millard K. Fingerprint Enhancement by Directional Fourier Filtering. In Image and Signal Processing, pages 88–94, 1994. [15]Szekely E.N and Szekely V. Image Recognition Problems of Fingerprint Identificatoin. In Microprocessors and Microsystems, 1993. [16]T. Le and k. cheung and M. Nguyen. A Fingerprint Recognizer using Fuzzy Evolutionary Programming. 2001. [17]Trusted Computing Group. Embedded system and trusted computing security. In https://www.trustedcomputinggroup.org/groups/tpm/, 2002. [18]Yamhill St. Desktop Management Interface Specification. In http://www.dmtf.org/, 2003.
|