-
1
Trusted and anonymous authentication scheme for wireless networks
Published 2009-01-01Subjects: Get full text
Article -
2
Design and validation for a remote attestation security protocol
Published 2009-01-01Subjects: Get full text
Article -
3
Research on the trusted environment of container cloud based on the TPCM
Published 2021-08-01Subjects: Get full text
Article -
4
Direct anonymous authentication scheme for wireless networks under trusted computing
Published 2010-01-01Subjects: Get full text
Article -
5
Improved direct anonymous attestation scheme for mobile computing platforms
Published 2013-06-01Subjects: Get full text
Article -
6
Security-enhanced live migration based on SGX for virtual machine
Published 2017-09-01Subjects: Get full text
Article -
7
TM-Chain: TCB Measurement Management Using Cloud Blockchain for IoT Devices
Published 2025-01-01Subjects: Get full text
Article -
8
Method of designing security protocol for remote attestation
Published 2008-01-01Subjects: “…remote attestation…”
Get full text
Article -
9
Remote attestation scheme for cloud platform based on double-layer unbalanced hash tree
Published 2017-09-01Subjects: “…remote attestation…”
Get full text
Article -
10
Overview of research on trusted attestation technology of cloud virtualization platform
Published 2021-12-01Subjects: Get full text
Article -
11
VMI-based virtual machine remote attestation scheme
Published 2018-12-01Subjects: “…virtual machine remote attestation…”
Get full text
Article