共 50 条
- [32] Secure data management in trusted computing CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2005, PROCEEDINGS, 2005, 3659 : 324 - 338
- [33] Trusted Computing Based Mobile DRM Authentication Scheme FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
- [35] Secure VPNs for Trusted Computing Environments TRUSTED COMPUTING, PROCEEDINGS, 2009, 5471 : 197 - +
- [38] Secure user authentication based on the trusted platform for mobile devices EURASIP Journal on Wireless Communications and Networking, 2016
- [39] One Secure Access Scheme based on Trusted Execution Environment 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 16 - 21
- [40] Research on the Secure Boot Scheme of Automotive MCU Tongji Daxue Xuebao/Journal of Tongji University, 2024, 52 : 176 - 184