共 50 条
- [1] A Study of Trust & Privacy Models in Pervasive Computing Approach to Trusted Computing Platforms 2009 INTERNATIONAL CONFERENCE FOR TECHNICAL POSTGRADUATES (TECHPOS 2009), 2009, : 140 - +
- [2] Pervasive Trusted Computing SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 88 - +
- [3] Safeguarding personal data using trusted computing in pervasive computing PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING, 2005, 780 : 147 - 155
- [5] A Trust Model in Pervasive Computing 2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 370 - 374
- [6] An enhanced scheme of enforcing DTE security policy based on trusted computing technology PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3657 - +
- [7] The trust measurement scheme in trusted computing Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 586 - 591
- [8] Trust Service Selection in Pervasive Computing MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 173 - 176
- [10] A trust model for pervasive computing environments 2006 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2006, : 340 - +