-
1
Research on the trusted environment of container cloud based on the TPCM
Published 2021-08-01Subjects: Get full text
Article -
2
-
3
Non-interference trusted model based on processes
Published 2009-01-01Subjects: “…trusted…”
Get full text
Article -
4
Research of a trusted execution environment module for multiple platforms
Published 2014-11-01Subjects: Get full text
Article -
5
Access mechanism of TMP under mobile network
Published 2010-01-01Subjects: “…trusted computing…”
Get full text
Article -
6
Quantum Key Relay Scheme Based on Trusted Control Center
Published 2014-06-01Subjects: Get full text
Article -
7
-
8
Model checking of trusted cryptographic module
Published 2010-01-01Subjects: “…trusted computing platform…”
Get full text
Article -
9
Design and implementation of secure Windows platform based on TCM
Published 2015-08-01Subjects: “…trusted computing…”
Get full text
Article -
10
Trusted network connect control based on terminal behavior
Published 2009-01-01Subjects: “…trusted computing…”
Get full text
Article -
11
Trusted auditing method of virtual machine based on improved expectation decision method
Published 2018-06-01Subjects: “…trusted auditing…”
Get full text
Article -
12
Label-based protection scheme of vTPM secret
Published 2018-11-01Subjects: “…trusted computing…”
Get full text
Article -
13
-
14
IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions
Published 2022-07-01Subjects: Get full text
Article -
15
New extension method of trusted certificate chain in virtual platform environment
Published 2018-06-01Subjects: “…trusted computing…”
Get full text
Article -
16
Leak in trusted root certificates management and the method for solving
Published 2005-01-01Subjects: “…trusted root certificates…”
Get full text
Article -
17
Analyzing the trust chain of trusted virtualization platform based on the extended LS<sup>2</sup>
Published 2013-05-01Subjects: “…trusted computing…”
Get full text
Article -
18
P2P network identity authentication mechanism based on trusted alliance
Published 2020-04-01Subjects: Get full text
Article -
19
-
20
Application progress of SGX in trusted computing area
Published 2021-12-01Subjects: “…trusted computing…”
Get full text
Article