Showing 1 - 20 results of 30 for search '"trusted computing"', query time: 0.05s Refine Results
  1. 1

    Application progress of SGX in trusted computing area by Bo ZHAO, Anqi YUAN, Yang AN

    Published 2021-12-01
    Subjects: “…trusted computing…”
    Get full text
    Article
  2. 2

    Noninterference model for integrity by ZHANG Fan1, CHEN Shu2, SANG Yong-xuan1, YOU Lin1

    Published 2011-01-01
    Subjects: “…noninterference;integrity;confidentiality;information security;trusted computing…”
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    Design and validation for a remote attestation security protocol by WANG Dan, WEI Jin-feng, ZHOU Xiao-dong

    Published 2009-01-01
    Subjects: “…trusted computing;remote attestation;security protocol;CSP…”
    Get full text
    Article
  7. 7
  8. 8

    Model checking of trusted cryptographic module by CHEN Xiao-feng, FENG Deng-guo

    Published 2010-01-01
    Subjects: “…trusted computing platform…”
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Research of platform identity attestation based on trusted chip by Qian-ying ZHANG, Deng-guo FENG, Shi-jun ZHAO

    Published 2014-08-01
    Subjects: “…trusted computing;platform identity attestation;protocol composition logic;anonymity…”
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Label-based protection scheme of vTPM secret by Xingshu CHEN, Wei WANG, Xin JIN

    Published 2018-11-01
    Subjects: “…trusted computing…”
    Get full text
    Article
  18. 18
  19. 19
  20. 20