Password management scheme based on trusted computing

被引:0
|
作者
National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China [1 ]
机构
来源
Beijing Youdian Daxue Xuebao | 2008年 / 5卷 / 93-97期
关键词
Trusted computing;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Improved Trusted Storage Key Authorization Management Scheme Based on Timestamp
    Zhai, Guang-hui
    Li, Juan
    Song, Cheng
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 1, 2012, 288 : 327 - +
  • [32] A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
    Wang Xingfu
    Lu Qiwei
    Xiong Yan
    Miao Fuyou
    Huang Wenchao
    Liu Tao
    Wu Xuangou
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (02) : 284 - 290
  • [33] Secure VANETs: Trusted Communication Scheme between Vehicles and Infrastructure Based on Fog Computing
    Arif, Muhammad
    Wang, Guojun
    Balas, Valentina Emilia
    STUDIES IN INFORMATICS AND CONTROL, 2018, 27 (02): : 235 - 246
  • [34] A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
    WANG Xingfu
    LU Qiwei
    XIONG Yan
    MIAO Fuyou
    HUANG Wenchao
    LIU Tao
    WU Xuangou
    ChineseJournalofElectronics, 2014, 23 (02) : 284 - 290
  • [35] A trusted key management scheme for digital rights management
    Jeong, Y
    Yoon, K
    Ryou, J
    ETRI JOURNAL, 2005, 27 (01) : 114 - 117
  • [36] A Practical Password Management Scheme based on Computer Hardware Information and IC card
    Xu, Jie
    Jia, Zhongtian
    Zhang, Bo
    Ma, Minyao
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE), 2017, 190 : 586 - 594
  • [37] WLAN Mesh security association scheme in trusted computing environment
    Xiao, Yue-Lei
    Wang, Yu-Min
    Pang, Liao-Jun
    Tan, Shi-Chong
    Tongxin Xuebao/Journal on Communications, 2014, 35 (07): : 94 - 103
  • [38] Integrity Measurement based on Trusted Computing
    Li, Yiming
    Ba, Haihe
    Ren, Jiangchun
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2015, 21 : 956 - 959
  • [39] A secure bootstrap based on trusted computing
    Gu, Junkai
    Ji, Weiyong
    2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 502 - 504
  • [40] Safety Management Solution for Health Monitoring User Terminals Based on Trusted Computing
    Liu, Maomao
    Wu, Liping
    Zhang, Xingbo
    Li, Yan
    Scientific Programming, 2022, 2022