共 50 条
[21]
Fast authentication public key infrastructure for mobile ad hoc networks based on trusted computing
[J].
2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4,
2006,
:910-913
[23]
A Trusted Remote Attestation Model based on Trusted Computing
[J].
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013),
2013,
:1504-1509
[24]
Trusted computing, trusted third parties, and verified communications
[J].
SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS,
2004, 147
:291-308
[25]
Research on trusted storage based on trusted computing platform
[J].
Tongxin Xuebao,
2007, SUPPL. (117-120)
[26]
Protected Computing vs. Trusted Computing
[J].
2006 1ST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2,
2006,
:14-+
[27]
A Comprehensive Approach to a Trusted Test Infrastructure
[J].
2019 IEEE 4TH INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW 2019),
2019,
:43-48
[29]
Trusted computing and forensic investigations
[J].
DIGITAL INVESTIGATION,
2005, 2 (03)
:189-192
[30]
EXTENDING THE TRUSTED COMPUTING BASE
[J].
AIAA COMPUTERS IN AEROSPACE VII CONFERENCE, PTS 1 AND 2: A COLLECTION OF PAPERS,
1989,
:1070-1077