-
41
Approach on runtime monitoring based on the embedded trusted platforms
Published 2017-10-01Subjects: “…trusted computing…”
Get full text
Article -
42
Scheme of virtual machine trusted migration in cloud environment
Published 2018-01-01Subjects: “…trusted computing…”
Get full text
Article -
43
A general way to assign IPv6 trusted address under portal authentication
Published 2019-12-01Subjects: Get full text
Article -
44
Research and implementation of data security for mobile terminal based on TEE
Published 2017-03-01Subjects: Get full text
Article -
45
Trusted solution monitoring system based on ZigBee wireless sensor network
Published 2017-11-01Subjects: Get full text
Article -
46
Research on key management and authentication protocol of PDA in smart grid
Published 2018-03-01Subjects: Get full text
Article -
47
Trusted access scheme for intranet mobile terminal based on encrypted SD card
Published 2019-08-01Subjects: Get full text
Article -
48
Blockchain-based result-traceable searchable encryption scheme
Published 2019-09-01Subjects: Get full text
Article -
49
Research of platform identity attestation based on trusted chip
Published 2014-08-01Subjects: “…trusted computing…”
Get full text
Article -
50
Design and implementation of routing strategy based on terminal trust
Published 2016-04-01Subjects: “…trusted routing…”
Get full text
Article -
51
Guiding the security protection of critical information infrastructure with scientific network security concept
Published 2019-09-01Subjects: Get full text
Article -
52
Trusted cloud platform management model based onTPMalliance
Published 2016-02-01Subjects: Get full text
Article -
53
Threshold traceability anonymous authentication scheme without trusted center for ad hoc network
Published 2012-08-01Subjects: Get full text
Article -
54
Security signaling optimization in optical network for smart substation
Published 2019-02-01Subjects: Get full text
Article -
55
Formal Description of Trusted Bebavior Oriented Security System for Big Data
Published 2014-07-01Subjects: Get full text
Article -
56
Universally composable secure trusted access protocol for WLAN Mesh networks
Published 2008-01-01Subjects: Get full text
Article -
57
Research on metrics models for cloud services information security evaluation
Published 2016-07-01Subjects: “…trusted cloud services…”
Get full text
Article -
58
Research of trust evaluation model based on dynamic Bayesian network
Published 2013-09-01Subjects: “…trusted network…”
Get full text
Article -
59
Trusted secure model for data services in cloud computing
Published 2014-10-01Subjects: Get full text
Article -
60
Research on safety supervision data sharing of railway construction projects based on edge computing
Published 2020-06-01Subjects: Get full text
Article