共 50 条
- [2] A Way of Key Management in Cloud Storage Based on Trusted Computing NETWORK AND PARALLEL COMPUTING, 2011, 6985 : 135 - 145
- [4] Research of key management based on trusted module for cloud storage user Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (06): : 25 - 31
- [5] A Key Management Scheme for Establishing an Encryption-based Trusted IoT System 2019 4TH IEEE/ACM INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2019, : 41 - 46
- [6] An Improved Authorization System Base on Trusted Network 2013 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2013, : 327 - 330
- [9] Secure Authorization for Controlling Access via Key Management Scheme 2013 IEEE INTERNATIONAL CONFERENCE OF IEEE REGION 10 (TENCON), 2013,
- [10] A Trusted Authorization Scheme for E-commerce Systems 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,