共 50 条
- [31] Improved Trusted Storage Key Authorization Management Scheme Based on Timestamp COMMUNICATIONS AND INFORMATION PROCESSING, PT 1, 2012, 288 : 327 - +
- [33] Secure VANETs: Trusted Communication Scheme between Vehicles and Infrastructure Based on Fog Computing STUDIES IN INFORMATICS AND CONTROL, 2018, 27 (02): : 235 - 246
- [36] A Practical Password Management Scheme based on Computer Hardware Information and IC card INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE), 2017, 190 : 586 - 594
- [37] WLAN Mesh security association scheme in trusted computing environment Tongxin Xuebao/Journal on Communications, 2014, 35 (07): : 94 - 103
- [38] Integrity Measurement based on Trusted Computing PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2015, 21 : 956 - 959
- [39] A secure bootstrap based on trusted computing 2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 502 - 504