共 50 条
- [1] A trusted computing model based on code authorization 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 495 - +
- [2] Improved Trusted Storage Key Authorization Management Scheme Based on Timestamp COMMUNICATIONS AND INFORMATION PROCESSING, PT 1, 2012, 288 : 327 - +
- [3] A Trust Network Driven User Authorization Scheme for Social Cloud RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 533 - 542
- [4] A Trusted Authorization Scheme for E-commerce Systems 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
- [5] An Improved Authorization System Base on Trusted Network 2013 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2013, : 327 - 330
- [7] A Cloud Data Access Authorization Update Scheme Based on Blockchain 2020 3RD INTERNATIONAL CONFERENCE ON SMART BLOCKCHAIN (SMARTBLOCK), 2020, : 33 - 38
- [8] A User Authentication Scheme Based on Trusted Platform for Cloud Computing SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
- [10] A Trusted Connection Based Scheme for Ad Hoc Network 2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, : 34 - 38