共 50 条
- [21] Privacy Preserving of Trust Management Credentials Based on Trusted Computing INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 251 - 263
- [22] Trusted Computing Based Mobile DRM Authentication Scheme FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
- [23] A Trusted Measurement Scheme for Wireless Sensor Networks PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2015, : 277 - 281
- [24] Quantitative assignment of the grid behavior trust model based on trusted computing Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, 2010, 35 (05): : 587 - 590
- [25] Research of Mobile Agent Trust Management Model in Trusted Computing Environment 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
- [26] In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 399 - 409
- [27] Trust Management for Mobile Agent System Based on Trusted Computing Platforms 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 717 - +
- [28] In Search of Trust: 30 Years of Evolution of Trusted Computing and Hardware Security PROCEEDINGS OF THE 2023 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2023, 2023, : 1 - 1
- [29] Research on Behavior Trust Based on Bayesian Inference in Trusted Computing Networks 2015 IEEE INTERNATIONAL CONFERENCE ON SMART CITY/SOCIALCOM/SUSTAINCOM (SMARTCITY), 2015, : 1134 - 1138
- [30] Dynamic Integrity Measurement Model Based on Trusted Computing 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 281 - 284