共 50 条
- [31] The key security management scheme of cloud storage based on blockchain and digital twins Journal of Cloud Computing, 13
- [32] Trusted Blockchain-Based Signcryption Protocol and Data Management for Authentication and Authorization in VANETs WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
- [34] Towards a Trusted Hadoop Storage Platform: Design Considerations of an AES Based Encryption Scheme with TPM Rooted Key Protections 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, 2013, : 444 - 451
- [35] An Improved ID-Based Key Management Scheme in Wireless Sensor Network ADVANCES IN SWARM INTELLIGENCE, ICSI 2012, PT II, 2012, 7332 : 351 - 359
- [36] Operating system network security enhancement scheme based on trusted storage Intelligent and Converged Networks, 2023, 4 (02): : 127 - 141
- [37] Improved Group-key-management Scheme for WSN 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 330 - 333
- [40] A Trusted Third Party-Based Key Agreement Scheme in Cloud Computing INTELLIGENCE SCIENCE AND BIG DATA ENGINEERING: BIG DATA AND MACHINE LEARNING TECHNIQUES, ISCIDE 2015, PT II, 2015, 9243 : 407 - 412