-
1
Trusted coalition-proof protocol model based on secure multi-part computing
Published 2011-01-01Subjects: Get full text
Article -
2
IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions
Published 2022-07-01Subjects: Get full text
Article -
3
Application progress of SGX in trusted computing area
Published 2021-12-01Subjects: “…trusted computing…”
Get full text
Article -
4
Trusted and anonymous authentication scheme for wireless networks
Published 2009-01-01Subjects: “…trusted computing…”
Get full text
Article -
5
-
6
-
7
Design and validation for a remote attestation security protocol
Published 2009-01-01Subjects: “…trusted computing…”
Get full text
Article -
8
Trusted computing mobile terminal application research based on biometric trusted access protocol
Published 2017-02-01Subjects: Get full text
Article -
9
Trusted virtual machine management model for cloud computing
Published 2014-11-01Subjects: Get full text
Article -
10
Research on the trusted environment of container cloud based on the TPCM
Published 2021-08-01Subjects: “…trusted computing…”
Get full text
Article -
11
Model checking of trusted cryptographic module
Published 2010-01-01Subjects: “…trusted computing platform…”
Get full text
Article -
12
HyperSpector:VMM dynamic trusted monitor based on UEFI
Published 2016-12-01Subjects: Get full text
Article -
13
Direct anonymous authentication scheme for wireless networks under trusted computing
Published 2010-01-01Subjects: Get full text
Article -
14
Trusted platform for third-party cloud computing online evaluation and analysis technology
Published 2019-10-01Subjects: Get full text
Article -
15
Improved direct anonymous attestation scheme for mobile computing platforms
Published 2013-06-01Subjects: “…trusted computing…”
Get full text
Article -
16
Data integrity verification based on model cloud federation of TPA
Published 2018-08-01Subjects: Get full text
Article -
17
Design and implementation of secure Windows platform based on TCM
Published 2015-08-01Subjects: “…trusted computing…”
Get full text
Article -
18
Approach on runtime monitoring based on the embedded trusted platforms
Published 2017-10-01Subjects: “…trusted computing…”
Get full text
Article -
19
Scheme of virtual machine trusted migration in cloud environment
Published 2018-01-01Subjects: “…trusted computing…”
Get full text
Article -
20
Trusted solution monitoring system based on ZigBee wireless sensor network
Published 2017-11-01Subjects: Get full text
Article