-
1
IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions
Published 2022-07-01Subjects: Get full text
Article -
2
Application progress of SGX in trusted computing area
Published 2021-12-01Subjects: “…trusted computing…”
Get full text
Article -
3
Trusted and anonymous authentication scheme for wireless networks
Published 2009-01-01Subjects: “…trusted computing…”
Get full text
Article -
4
-
5
-
6
Design and validation for a remote attestation security protocol
Published 2009-01-01Subjects: “…trusted computing…”
Get full text
Article -
7
Trusted computing mobile terminal application research based on biometric trusted access protocol
Published 2017-02-01Subjects: Get full text
Article -
8
Trusted virtual machine management model for cloud computing
Published 2014-11-01Subjects: Get full text
Article -
9
Research on the trusted environment of container cloud based on the TPCM
Published 2021-08-01Subjects: “…trusted computing…”
Get full text
Article -
10
Model checking of trusted cryptographic module
Published 2010-01-01Subjects: “…trusted computing platform…”
Get full text
Article -
11
HyperSpector:VMM dynamic trusted monitor based on UEFI
Published 2016-12-01Subjects: Get full text
Article -
12
Direct anonymous authentication scheme for wireless networks under trusted computing
Published 2010-01-01Subjects: Get full text
Article -
13
Trusted platform for third-party cloud computing online evaluation and analysis technology
Published 2019-10-01Subjects: Get full text
Article -
14
Improved direct anonymous attestation scheme for mobile computing platforms
Published 2013-06-01Subjects: “…trusted computing…”
Get full text
Article -
15
Data integrity verification based on model cloud federation of TPA
Published 2018-08-01Subjects: Get full text
Article -
16
Design and implementation of secure Windows platform based on TCM
Published 2015-08-01Subjects: “…trusted computing…”
Get full text
Article -
17
Approach on runtime monitoring based on the embedded trusted platforms
Published 2017-10-01Subjects: “…trusted computing…”
Get full text
Article -
18
Scheme of virtual machine trusted migration in cloud environment
Published 2018-01-01Subjects: “…trusted computing…”
Get full text
Article -
19
Trusted solution monitoring system based on ZigBee wireless sensor network
Published 2017-11-01Subjects: Get full text
Article -
20
Research on key management and authentication protocol of PDA in smart grid
Published 2018-03-01Subjects: Get full text
Article