共 50 条
- [22] Content Protection based on Trusted computing in Mobile Terminal 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 192 - 195
- [23] A Trusted Third Party-based Authentication Scheme in Cloud Computing INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 850 - 856
- [24] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing 2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
- [25] Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 190 - 195
- [26] Implementation of a TCG-based trusted computing in mobile device TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2008, 5185 : 18 - 27
- [27] Based on Trusted Computing Solutions for Mobile Payment Terminal Security NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 570 - 574
- [28] A document protection solution in mobile platform based on trusted computing 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 251 - 255
- [29] User Authentication in Cloud Computing UBIQUITOUS COMPUTING AND MULTIMEDIA APPLICATIONS, PT II, 2011, 151 : 338 - 342
- [30] A mobile and portable trusted computing platform EURASIP Journal on Wireless Communications and Networking, 2011