共 50 条
[31]
An Efficient Security Architecture for Trusted Computing
[J].
2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4,
2009,
:599-601
[32]
Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks
[J].
APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS,
2008,
:43-+
[33]
OSLO: Improving the security of trusted computing
[J].
USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM,
2007,
:229-237
[34]
An enhanced scheme of enforcing DTE security policy based on trusted computing technology
[J].
PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7,
2008,
:3657-+
[36]
Research on theory and key technology of trusted computing platform security testing and evaluation
[J].
Science China Information Sciences,
2010, 53
:434-453
[39]
The Trusted Computing exemplary with Astonishing Security for Cloud Computing
[J].
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY,
2011, 11 (01)
:206-209
[40]
Application of edge computing technology in smart grid data security
[J].
Measurement: Sensors,
2025, 37