-
1
Application progress of SGX in trusted computing area
Published 2021-12-01Subjects: “…trusted computing…”
Get full text
Article -
2
Noninterference model for integrity
Published 2011-01-01Subjects: “…noninterference;integrity;confidentiality;information security;trusted computing…”
Get full text
Article -
3
-
4
Trusted computing mobile terminal application research based on biometric trusted access protocol
Published 2017-02-01Subjects: Get full text
Article -
5
Trusted virtual machine management model for cloud computing
Published 2014-11-01Subjects: Get full text
Article -
6
Design and validation for a remote attestation security protocol
Published 2009-01-01Subjects: “…trusted computing;remote attestation;security protocol;CSP…”
Get full text
Article -
7
An Improved Summary–Explanation Method for Promoting Trust Through Greater Support with Application to Credit Evaluation Systems
Published 2025-04-01Subjects: Get full text
Article -
8
Model checking of trusted cryptographic module
Published 2010-01-01Subjects: “…trusted computing platform…”
Get full text
Article -
9
Trusted platform for third-party cloud computing online evaluation and analysis technology
Published 2019-10-01Subjects: Get full text
Article -
10
Approach on runtime monitoring based on the embedded trusted platforms
Published 2017-10-01Subjects: “…trusted computing…”
Get full text
Article -
11
Research of platform identity attestation based on trusted chip
Published 2014-08-01Subjects: “…trusted computing;platform identity attestation;protocol composition logic;anonymity…”
Get full text
Article -
12
Research on key management and authentication protocol of PDA in smart grid
Published 2018-03-01Subjects: Get full text
Article -
13
Trusted access scheme for intranet mobile terminal based on encrypted SD card
Published 2019-08-01Subjects: Get full text
Article -
14
Research of platform identity attestation based on trusted chip
Published 2014-08-01Subjects: “…trusted computing…”
Get full text
Article -
15
Guiding the security protection of critical information infrastructure with scientific network security concept
Published 2019-09-01Subjects: Get full text
Article -
16
Trusted auditing method of virtual machine based on improved expectation decision method
Published 2018-06-01Subjects: Get full text
Article -
17
Label-based protection scheme of vTPM secret
Published 2018-11-01Subjects: “…trusted computing…”
Get full text
Article -
18
WLAN Mesh security association scheme in trusted computing environment
Published 2014-07-01Subjects: Get full text
Article -
19
Adaptive and survivable trust management for Internet of Things systems
Published 2021-09-01Subjects: Get full text
Article -
20
On privacy of property-based remote attestation
Published 2009-01-01Subjects: “…trusted computing…”
Get full text
Article