共 50 条
- [22] An efficient anonymous remote attestation scheme for trusted computing based on improved CPK Electronic Commerce Research, 2019, 19 : 689 - 718
- [23] Secure data management in trusted computing CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2005, PROCEEDINGS, 2005, 3659 : 324 - 338
- [25] A Trusted Remote Attestation Model based on Trusted Computing 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509
- [26] Research on trusted storage based on trusted computing platform Tongxin Xuebao, 2007, SUPPL. (117-120):
- [27] Research on Video Surveillance Key Management Scheme Based on Identification Password 2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 741 - 746
- [28] White List Security Management Mechanism based on Trusted Computing Technology PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1369 - 1377
- [29] CMM: Credential migration management system based on trusted computing in CGSP Frontiers of Computer Science in China, 2007, 1 (2): : 200 - 207
- [30] Trust Management for Mobile Agent System Based on Trusted Computing Platforms 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 717 - +