-
461
Modified security model based on dynamic trusted degree
Published 2008-01-01Subjects: Get full text
Article -
462
Direct anonymous authentication scheme for wireless networks under trusted computing
Published 2010-01-01Subjects: Get full text
Article -
463
Cloud Trustworthiness Evaluation as a cloud service:architecture,key technologies and implementations
Published 2016-10-01Subjects: Get full text
Article -
464
Trusted platform for third-party cloud computing online evaluation and analysis technology
Published 2019-10-01Subjects: Get full text
Article -
465
Genç Tüketicilerde E-Ticaret Sitelerine Yönelik Marka Güveni ve Tüketici-Marka Özdeşleşmesinin Marka Evangelizmi Üzerine Etkisi
Published 2023-07-01Subjects: Get full text
Article -
466
Quantitative assessment of brain metabolism in mice using non-contrast MRI at 11.7T
Published 2025-06-01Subjects: “…T2-relaxation-under-spin-tagging (TRUST)…”
Get full text
Article -
467
MARKA NOSTALJİSİNİN MARKA GÜVENİ, MARKA BAĞLILIĞI VE SATIN ALMA NİYETİNE ETKİSİ: GAZLI İÇECEK SEKTÖRÜ ÜZERİNE BİR ARAŞTIRMA
Published 2023-11-01Subjects: Get full text
Article -
468
Improved direct anonymous attestation scheme for mobile computing platforms
Published 2013-06-01Subjects: “…trusted computing…”
Get full text
Article -
469
Data integrity verification based on model cloud federation of TPA
Published 2018-08-01Subjects: Get full text
Article -
470
BCSE: Blockchain-Based Trusted Service Evaluation Model over Big Data
Published 2022-03-01Subjects: Get full text
Article -
471
Dynamic spectrum sharing access technology based on blockchain
Published 2020-06-01Subjects: Get full text
Article -
472
Approach on runtime monitoring based on the embedded trusted platforms
Published 2017-10-01Subjects: “…trusted computing…”
Get full text
Article -
473
Scheme of virtual machine trusted migration in cloud environment
Published 2018-01-01Subjects: “…trusted computing…”
Get full text
Article -
474
A general way to assign IPv6 trusted address under portal authentication
Published 2019-12-01Subjects: Get full text
Article -
475
Research and implementation of data security for mobile terminal based on TEE
Published 2017-03-01Subjects: Get full text
Article -
476
Trusted solution monitoring system based on ZigBee wireless sensor network
Published 2017-11-01Subjects: Get full text
Article -
477
Research on key management and authentication protocol of PDA in smart grid
Published 2018-03-01Subjects: Get full text
Article -
478
Trusted access scheme for intranet mobile terminal based on encrypted SD card
Published 2019-08-01Subjects: Get full text
Article -
479
Blockchain-based result-traceable searchable encryption scheme
Published 2019-09-01Subjects: Get full text
Article -
480
Research of platform identity attestation based on trusted chip
Published 2014-08-01Subjects: “…trusted computing…”
Get full text
Article