共 50 条
- [1] Trusted Computing Based Mobile DRM Authentication Scheme FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
- [2] Trusted computing based open environment user authentication model ICACTE - Int. Conf. Adv. Comput. Theory Eng., Proc., (V6487-V6491):
- [3] A User Authentication Scheme Based on Trusted Platform for Cloud Computing SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
- [5] Secure user authentication based on the trusted platform for mobile devices EURASIP Journal on Wireless Communications and Networking, 2016
- [6] User authentication with smart cards in trusted computing architecture SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 25 - 31
- [8] DESIGN AND IMPLEMENTATION OF TRUSTED COMPUTING-BASED MUTUAL AUTHENTICATION MODEL FOR MOBILE TERMINAL 2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 3: COMPUTER-AIDED DESIGN, MANUFACTURING AND MANAGEMENT, 2011, : 309 - 313
- [9] The Authentication and Identity Delegation about Mobile Agent System based on Trusted Computing Platform ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2010, : 672 - 676
- [10] Trusted user authentication scheme combining password with fingerprint for mobile devices 2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 63 - +