共 50 条
- [41] A Trusted Bootstrap Scheme on EFI MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 200 - 204
- [42] An analysis of a secure system based on trusted components COMPASS '96 - PROCEEDINGS OF THE ELEVENTH ANNUAL CONFERENCE ON COMPUTER ASSURANCE: SYSTEMS INTEGRITY, SOFTWARE SAFETY, PROCESS SECURITY, 1996, : 213 - 223
- [44] The research of Trusted Computing based on the model of trusted Meta data of BSCM 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 941 - 945
- [45] Secure Distributed Computing on Untrusted Fog Infrastructures Using Trusted Linux Containers 2018 16TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2018), 2018, : 239 - 242
- [46] A secure multi-party computing and scenario application for trusted data circulation DEVELOPMENTS OF ARTIFICIAL INTELLIGENCE TECHNOLOGIES IN COMPUTATION AND ROBOTICS, 2020, 12 : 369 - 377
- [47] Identity anonymity for grid computing coordination based on trusted computing SIXTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2007, : 403 - +
- [49] Security strategy of DRM based on trusted computing Journal of Computational Information Systems, 2011, 7 (09): : 3226 - 3234
- [50] A trusted computing model based on code authorization 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 495 - +