共 50 条
- [31] The research of Trusted Computing based on the model of trusted Meta data of BSCM 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 941 - 945
- [32] A Survey and Research Model for Vehicular Communication and Security Challenges 2018 12TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2018, : 291 - 296
- [34] A Secure Trust Model Based on Trusted Computing 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 170 - 176
- [35] A LDAP SYNCHRONIZATION MODEL BASED ON TRUSTED COMPUTING PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 2771 - 2774
- [37] The Trusted Computing exemplary with Astonishing Security for Cloud Computing INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (01): : 206 - 209
- [38] A comparison of the trusted computing group security model with Clark-Wilson SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 395 - 401
- [40] White List Security Management Mechanism based on Trusted Computing Technology PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1369 - 1377