共 50 条
- [1] A scheme based on trusted computing for terminal security [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
- [2] An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (03): : 430 - 437
- [4] A Security Scheme for Fog Computing Environment of loT [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL ACM WORKSHOP ON SECURITY AND PRIVACY FOR THE INTERNET-OF-THINGS (IOT S&P'19), 2019, : 58 - 59
- [5] Mobile Security and Trusted Computing [J]. IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 321 - 326
- [9] A Trusted Network Access Protocol for WLAN Mesh Networks [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2013, E96D (12): : 2865 - 2869
- [10] An enhanced scheme of enforcing DTE security policy based on trusted computing technology [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3657 - +