Security communication model for vehicular clouds based on trusted computing

被引:0
|
作者
Zhang, Wenbo [1 ,2 ]
Bao, Zhenshan [1 ]
Li, Jian [1 ,2 ]
Zhan, Jing [1 ,2 ]
机构
[1] [1,Zhang, Wenbo
[2] Bao, Zhenshan
[3] 1,Li, Jian
[4] 1,Zhan, Jing
来源
Zhang, Wenbo (zhangwenbo@bjut.edu.cn) | 1600年 / Huazhong University of Science and Technology卷 / 42期
关键词
12;
D O I
10.13245/j.hust.141119
中图分类号
学科分类号
摘要
引用
收藏
页码:102 / 105
相关论文
共 50 条
  • [41] DHT-based security infrastructure for trusted internet and grid computing
    Hwang, Kai
    Cai, Min
    Kwok, Yu-Kwong
    Song, Shanshan
    Chen, Yu
    Chen, Ying
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2006, 2 (04) : 412 - 433
  • [42] Research on Smart Mobile Terminal Security Technology Based on Trusted Computing
    Li, Ming
    Fang, Yuan
    Liu, Jun
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 3278 - 3281
  • [43] An improved wireless grid security infrastructure based on trusted computing technology
    Yan, Fei
    Zhang, Huanguo
    Shen, Zhidong
    Zhang, Liqiang
    Qiang, Weizhong
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1186 - +
  • [44] Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
    Xin Jin
    Qixu Wang
    Xiang Li
    Xingshu Chen
    Wei Wang
    TsinghuaScienceandTechnology, 2019, 24 (05) : 520 - 534
  • [45] Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
    Jin, Xin
    Wang, Qixu
    Li, Xiang
    Chen, Xingshu
    Wang, Wei
    TSINGHUA SCIENCE AND TECHNOLOGY, 2019, 24 (05) : 520 - 534
  • [46] Trusted Task Offloading in Vehicular Edge Computing Networks: A Reinforcement Learning Based Solution
    Zhang, Lushi
    Guo, Hongzhi
    Zhou, Xiaoyi
    Liu, Jiajia
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 6711 - 6716
  • [47] Trusted computing and advanced security in edge computing and Internet of Things
    Cang, Li Shan
    Al-Dubai, Ahmed
    Song, Houbing
    Mumtaz, Shahid
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (06):
  • [48] Research on Trust Model Based on Behavior and Trusted Computing
    Gu Yue-sheng
    Chen Jun
    Wang Yan-rong
    PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 1259 - 1263
  • [49] PKI Mesh Trust Model Based on Trusted Computing
    Liu, Changping
    Feng, Yong
    Fan, Mingyu
    Wang, Guangwei
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1401 - 1405
  • [50] Trusted computing - Path to security or road to servitude?
    Hilley, Sarah
    Network Security, 2004, 2004 (08) : 12 - 15