-
21
Endogenous trusted network architecture for intelligent sharing
Published 2020-11-01Subjects: “…endogenous trusted…”
Get full text
Article -
22
Virtualization security:the good,the bad and the ugly
Published 2016-10-01Subjects: Get full text
Article -
23
Initialization scheme of the trusted execution environment based on the user card
Published 2017-02-01Subjects: Get full text
Article -
24
Trusted and anonymous authentication scheme for wireless networks
Published 2009-01-01Subjects: “…trusted computing…”
Get full text
Article -
25
-
26
Design and validation for a remote attestation security protocol
Published 2009-01-01Subjects: “…trusted computing…”
Get full text
Article -
27
Trusted computing mobile terminal application research based on biometric trusted access protocol
Published 2017-02-01Subjects: Get full text
Article -
28
Trusted virtual machine management model for cloud computing
Published 2014-11-01Subjects: Get full text
Article -
29
(t, n) threshold secret sharing scheme without SDC
Published 2006-01-01Subjects: Get full text
Article -
30
Research progress of trusted sensor-cloud based on fog computing
Published 2019-03-01Subjects: Get full text
Article -
31
Information service identity generation and management scheme for service supervision
Published 2021-10-01Subjects: Get full text
Article -
32
Modified security model based on dynamic trusted degree
Published 2008-01-01Subjects: Get full text
Article -
33
HyperSpector:VMM dynamic trusted monitor based on UEFI
Published 2016-12-01Subjects: Get full text
Article -
34
Direct anonymous authentication scheme for wireless networks under trusted computing
Published 2010-01-01Subjects: Get full text
Article -
35
Cloud Trustworthiness Evaluation as a cloud service:architecture,key technologies and implementations
Published 2016-10-01Subjects: Get full text
Article -
36
Trusted platform for third-party cloud computing online evaluation and analysis technology
Published 2019-10-01Subjects: Get full text
Article -
37
Improved direct anonymous attestation scheme for mobile computing platforms
Published 2013-06-01Subjects: “…trusted computing…”
Get full text
Article -
38
Data integrity verification based on model cloud federation of TPA
Published 2018-08-01Subjects: Get full text
Article -
39
BCSE: Blockchain-Based Trusted Service Evaluation Model over Big Data
Published 2022-03-01Subjects: Get full text
Article -
40
Dynamic spectrum sharing access technology based on blockchain
Published 2020-06-01Subjects: Get full text
Article