共 50 条
- [21] A secure bootstrap based on trusted computing 2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 502 - 504
- [23] The research of Trusted Computing based on the model of trusted Meta data of BSCM 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 941 - 945
- [24] Identity anonymity for grid computing coordination based on trusted computing SIXTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2007, : 403 - +
- [25] An Integrated Architecture for Trusted Computing for Java']Java enabled Embedded Devices STC'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SCALABLE TRUSTED COMPUTING, 2007, : 2 - 6
- [26] PISTIS: Trusted Computing Architecture for Low-end Embedded Systems PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3843 - 3860
- [27] Security strategy of DRM based on trusted computing Journal of Computational Information Systems, 2011, 7 (09): : 3226 - 3234
- [28] A trusted computing model based on code authorization 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 495 - +
- [30] A scheme based on trusted computing for terminal security PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +