共 50 条
- [1] Formal analysis of secure bootstrap in trusted computing AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 352 - +
- [2] Research and Implement of Secure Bootstrap for Virtual Machine based on Trusted Computing Platform EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 514 - 519
- [3] A Secure Trust Model Based on Trusted Computing 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 170 - 176
- [4] Secure data management in trusted computing CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2005, PROCEEDINGS, 2005, 3659 : 324 - 338
- [5] Secure VPNs for Trusted Computing Environments TRUSTED COMPUTING, PROCEEDINGS, 2009, 5471 : 197 - +
- [7] Seal-based secure boot scheme for trusted computing platform Journal of China Universities of Posts and Telecommunications, 2010, 17 (SUPPL. 2): : 16 - 21
- [9] Trusted Secure Routing Schemes Based on Intelligent Computing: A Brief Review ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT V, ICIC 2024, 2024, 14879 : 275 - 284
- [10] The Role of Trusted Computing in Secure Agent Migration RCIS 2009: PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE, 2009, : 255 - +