Password management scheme based on trusted computing

被引:0
|
作者
National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China [1 ]
机构
来源
Beijing Youdian Daxue Xuebao | 2008年 / 5卷 / 93-97期
关键词
Trusted computing;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment
    Liu, Zewei
    Hu, Chunqiang
    Li, Ruinian
    Xiang, Tao
    Li, Xingwang
    Yu, Jiguo
    Xia, Hui
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2325 - 2336
  • [22] An efficient anonymous remote attestation scheme for trusted computing based on improved CPK
    Yu Fajiang
    Chen Jing
    Xiang Yang
    Zhu Jiacheng
    Zhao Yangdi
    Electronic Commerce Research, 2019, 19 : 689 - 718
  • [23] Secure data management in trusted computing
    Kühn, U
    Kursawe, K
    Lucks, S
    Sadeghi, AR
    Stüble, C
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2005, PROCEEDINGS, 2005, 3659 : 324 - 338
  • [24] Integrity management infrastructure for trusted computing
    Munetoh, Seiji
    Nakamura, Megumi
    Yoshihama, Sachiko
    Kudo, Michiharu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1242 - 1251
  • [25] A Trusted Remote Attestation Model based on Trusted Computing
    Yu, Yue
    Wang, Huaimin
    Liu, Bo
    Yin, Gang
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509
  • [26] Research on trusted storage based on trusted computing platform
    School of Computer, Wuhan University, Wuhan 430072, China
    不详
    Tongxin Xuebao, 2007, SUPPL. (117-120):
  • [27] Research on Video Surveillance Key Management Scheme Based on Identification Password
    Ge, Ge
    Feng, Huamin
    Liu, Biao
    Zhang, Junwei
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 741 - 746
  • [28] White List Security Management Mechanism based on Trusted Computing Technology
    Zhao, Baohua
    Zhang, Hao
    Guo, Hao
    Qi, Yue
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1369 - 1377
  • [29] CMM: Credential migration management system based on trusted computing in CGSP
    Jin H.
    Yi C.
    Frontiers of Computer Science in China, 2007, 1 (2): : 200 - 207
  • [30] Trust Management for Mobile Agent System Based on Trusted Computing Platforms
    Shen, Zhidong
    Wu, Xiaoping
    Zhan, Jing
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 717 - +