共 50 条
- [1] Enforcing trust in pervasive computing with trusted computing technology CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 195 - +
- [2] A Secure Trust Model Based on Trusted Computing 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 170 - 176
- [3] A Trust Model for Heterogeneous Trusted Computing Architectures NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 539 - +
- [5] Integrity Measurement based on Trusted Computing PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2015, 21 : 956 - 959
- [6] Security analysis on trust chain of trusted computing platform Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (07): : 1165 - 1176
- [7] A scheme based on trusted computing for terminal security PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
- [8] Digital Trust - Trusted Computing and Beyond A Position Paper 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 884 - 892
- [9] Research on Trust Model Based on Behavior and Trusted Computing PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 1259 - 1263