共 50 条
- [21] Bootstrapping Trust in a "Trusted" Virtualized Platform PROCEEDINGS OF THE 1ST ACM WORKSHOP ON WORKSHOP ON CYBER-SECURITY ARMS RACE (CYSARM '19), 2019, : 11 - 22
- [22] Trusted Environments for Volunteer Computing 2018 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2018, : 526 - 529
- [23] Survey on chain of trust of trusted system Zhang, Fan, 2024, Chinese Institute of Electronics (42): : 2024 - 2031
- [24] The Trust Management Model of Trusted Software 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 534 - 537
- [25] The trust measurement scheme in trusted computing Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 586 - 591
- [28] Research on Security Threats Using VPN in Zero Trust Environments INFORMATION SECURITY APPLICATIONS, WISA 2023, 2024, 14402 : 55 - 66
- [29] Triad: Trusted Timestamps in Untrusted Environments 2023 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE, CLOUDCOM 2023, 2023, : 169 - 176
- [30] Trust Metrics Based on a Trusted Network Element 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 660 - 667