-
21
Research on key management and authentication protocol of PDA in smart grid
Published 2018-03-01Subjects: Get full text
Article -
22
Trusted access scheme for intranet mobile terminal based on encrypted SD card
Published 2019-08-01Subjects: Get full text
Article -
23
Research of platform identity attestation based on trusted chip
Published 2014-08-01Subjects: “…trusted computing…”
Get full text
Article -
24
Guiding the security protection of critical information infrastructure with scientific network security concept
Published 2019-09-01Subjects: Get full text
Article -
25
Trusted network connect control based on terminal behavior
Published 2009-01-01Subjects: “…trusted computing…”
Get full text
Article -
26
Trusted auditing method of virtual machine based on improved expectation decision method
Published 2018-06-01Subjects: Get full text
Article -
27
Rational-security and fair two-party comparison protocol
Published 2023-12-01Subjects: Get full text
Article -
28
Label-based protection scheme of vTPM secret
Published 2018-11-01Subjects: “…trusted computing…”
Get full text
Article -
29
Research on consistency protection mechanism for secure states of virtual domain in cloud environment
Published 2016-10-01Subjects: Get full text
Article -
30
Access mechanism of TMP under mobile network
Published 2010-01-01Subjects: “…trusted computing…”
Get full text
Article -
31
Access control model based on trusted computing for integrated avionics system
Published 2009-01-01Subjects: Get full text
Article -
32
WLAN Mesh security association scheme in trusted computing environment
Published 2014-07-01Subjects: Get full text
Article -
33
On privacy of property-based remote attestation
Published 2009-01-01Subjects: “…trusted computing…”
Get full text
Article -
34
-
35
New extension method of trusted certificate chain in virtual platform environment
Published 2018-06-01Subjects: “…trusted computing…”
Get full text
Article -
36
Trust chain generating and updating algorithm for dual redundancy system
Published 2017-01-01Subjects: “…trusted computing…”
Get full text
Article -
37
Analyzing the trust chain of trusted virtualization platform based on the extended LS<sup>2</sup>
Published 2013-05-01Subjects: “…trusted computing…”
Get full text
Article -
38
Research of a trusted execution environment module for multiple platforms
Published 2014-11-01Subjects: Get full text
Article -
39
Virtualization security:the good,the bad and the ugly
Published 2016-10-01Subjects: Get full text
Article