-
21
Trusted access scheme for intranet mobile terminal based on encrypted SD card
Published 2019-08-01Subjects: Get full text
Article -
22
Research of platform identity attestation based on trusted chip
Published 2014-08-01Subjects: “…trusted computing…”
Get full text
Article -
23
Guiding the security protection of critical information infrastructure with scientific network security concept
Published 2019-09-01Subjects: Get full text
Article -
24
Trusted network connect control based on terminal behavior
Published 2009-01-01Subjects: “…trusted computing…”
Get full text
Article -
25
Trusted auditing method of virtual machine based on improved expectation decision method
Published 2018-06-01Subjects: Get full text
Article -
26
Rational-security and fair two-party comparison protocol
Published 2023-12-01Subjects: Get full text
Article -
27
Label-based protection scheme of vTPM secret
Published 2018-11-01Subjects: “…trusted computing…”
Get full text
Article -
28
Research on consistency protection mechanism for secure states of virtual domain in cloud environment
Published 2016-10-01Subjects: Get full text
Article -
29
Access mechanism of TMP under mobile network
Published 2010-01-01Subjects: “…trusted computing…”
Get full text
Article -
30
Access control model based on trusted computing for integrated avionics system
Published 2009-01-01Subjects: Get full text
Article -
31
WLAN Mesh security association scheme in trusted computing environment
Published 2014-07-01Subjects: Get full text
Article -
32
On privacy of property-based remote attestation
Published 2009-01-01Subjects: “…trusted computing…”
Get full text
Article -
33
-
34
New extension method of trusted certificate chain in virtual platform environment
Published 2018-06-01Subjects: “…trusted computing…”
Get full text
Article -
35
Trust chain generating and updating algorithm for dual redundancy system
Published 2017-01-01Subjects: “…trusted computing…”
Get full text
Article -
36
Analyzing the trust chain of trusted virtualization platform based on the extended LS<sup>2</sup>
Published 2013-05-01Subjects: “…trusted computing…”
Get full text
Article -
37
Research of a trusted execution environment module for multiple platforms
Published 2014-11-01Subjects: Get full text
Article -
38
Virtualization security:the good,the bad and the ugly
Published 2016-10-01Subjects: Get full text
Article -
39
Trusted coalition-proof protocol model based on secure multi-part computing
Published 2011-01-01Subjects: Get full text
Article