-
481
Design and implementation of routing strategy based on terminal trust
Published 2016-04-01Subjects: “…trusted routing…”
Get full text
Article -
482
Guiding the security protection of critical information infrastructure with scientific network security concept
Published 2019-09-01Subjects: Get full text
Article -
483
-
484
-
485
Trusted cloud platform management model based onTPMalliance
Published 2016-02-01Subjects: Get full text
Article -
486
Threshold traceability anonymous authentication scheme without trusted center for ad hoc network
Published 2012-08-01Subjects: Get full text
Article -
487
Security signaling optimization in optical network for smart substation
Published 2019-02-01Subjects: Get full text
Article -
488
Formal Description of Trusted Bebavior Oriented Security System for Big Data
Published 2014-07-01Subjects: Get full text
Article -
489
Universally composable secure trusted access protocol for WLAN Mesh networks
Published 2008-01-01Subjects: Get full text
Article -
490
Research on metrics models for cloud services information security evaluation
Published 2016-07-01Subjects: “…trusted cloud services…”
Get full text
Article -
491
Trusted secure model for data services in cloud computing
Published 2014-10-01Subjects: Get full text
Article -
492
Research on safety supervision data sharing of railway construction projects based on edge computing
Published 2020-06-01Subjects: Get full text
Article -
493
Rational-security and fair two-party comparison protocol
Published 2023-12-01Subjects: Get full text
Article -
494
GÜVEN TEORİSİNE DAİR HANEFİ MEZHEBİ BAĞLAMINDA BİR DEĞERLENDİRME
Published 2025-01-01Subjects: Get full text
Article -
495
-
496
-
497
Research on consistency protection mechanism for secure states of virtual domain in cloud environment
Published 2016-10-01Subjects: Get full text
Article -
498
Distributed storage causal consistency model with trusted constraint
Published 2021-06-01Subjects: Get full text
Article -
499
Access control model based on trusted computing for integrated avionics system
Published 2009-01-01Subjects: Get full text
Article -
500
WLAN Mesh security association scheme in trusted computing environment
Published 2014-07-01Subjects: Get full text
Article