共 50 条
- [31] A User Authentication Scheme Based on Trusted Platform for Cloud Computing SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
- [32] An Improved Scheme of μTESLA Authentication based Trusted Computing Platform 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4711 - 4714
- [33] WLAN Mesh security association scheme in trusted computing environment Tongxin Xuebao/Journal on Communications, 2014, 35 (07): : 94 - 103
- [34] A Multi Trust Chain Scheme in Trusted Cross-Domain Interaction 2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 550 - 553
- [35] TMS: Visual Monitoring of Trusted Platform Board for Trust Computing based on Web PROCEEDINGS OF THE 2009 FOURTH INTERNATIONAL CONFERENCE ON EMBEDDED AND MULTIMEDIA COMPUTING, 2009, : 67 - +
- [36] Testing on trust chain of trusted computing platform based on labeled transition system Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (04): : 635 - 645
- [37] Towards Improved Trust in Threat Intelligence Sharing using Blockchain and Trusted Computing 2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, : 474 - 481
- [38] Seal-based secure boot scheme for trusted computing platform Journal of China Universities of Posts and Telecommunications, 2010, 17 (SUPPL. 2): : 16 - 21
- [39] A Trusted Consensus Scheme for Collaborative Learning in the Edge AI Computing Domain IEEE NETWORK, 2021, 35 (01): : 204 - 210
- [40] A formal method based on noninterference for analyzing trust chain of trusted computing platform Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (01): : 74 - 81