The trust measurement scheme in trusted computing

被引:0
|
作者
Zhang, Li-Qiang [1 ,2 ]
Zhang, Huan-Guo [2 ,3 ]
Zhang, Fan [4 ]
机构
[1] State Key Lab of Software Engineering, Wuhan University, Wuhan 430072, China
[2] Computer School, Wuhan University, Wuhan 430072, China
[3] Key Lab of Aerospace Information Security and Trusted Computing, Wuhan University, Wuhan 430072, China
[4] College of Communication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:586 / 591
相关论文
共 50 条
  • [41] Mutual authentication scheme with smart cards and password under trusted computing
    Yang, Li
    Ma, Jian-Feng
    Jiang, Qi
    International Journal of Network Security, 2012, 14 (03) : 156 - 163
  • [42] Efficient and Secure Multi-Signature Scheme Based on Trusted Computing
    HAO Liming1
    2.School of Information Security Engineering
    WuhanUniversityJournalofNaturalSciences, 2008, (02) : 180 - 184
  • [43] Coded Circuit for Trusted Computing: Towards Dynamic Integrity Measurement
    Wu Hao
    Wu Guoqing
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL IV, 2010, : 126 - 130
  • [44] Direct anonymous authentication scheme for wireless networks under trusted computing
    Yang, Li
    Ma, Jian-Feng
    Pei, Qing-Qi
    Ma, Zhuo
    Tongxin Xuebao/Journal on Communications, 2010, 31 (08): : 98 - 104
  • [45] A Blockchain-Based Trusted Data Management Scheme in Edge Computing
    Ma Zhaofeng
    Wang Xiaochang
    Jain, Deepak Kumar
    Khan, Haneef
    Gao Hongmin
    Wang Zhen
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 2013 - 2021
  • [46] A Trusted Third Party-based Authentication Scheme in Cloud Computing
    Li, Ying
    Du, Li-Ping
    Zhao, Gui-Fen
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 850 - 856
  • [47] An anonymous watermarking scheme for content distribution protection using trusted computing
    Leung, Adrian
    Sen Poh, Geong
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 319 - 326
  • [48] Security analysis and improvement of a mutual authentication scheme under trusted computing
    Bin Muhaya, Fahad T.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2015, 18 (1-2) : 37 - 44
  • [49] Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme
    Rathee, Geetanjali
    Iqbal, Razi
    Khelifi, Adel
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02): : 2755 - 2769
  • [50] Coded Circuit for Trusted Computing: Towards Dynamic Integrity Measurement
    Wu Hao
    Wu Guoqing
    APPLIED INFORMATICS AND COMMUNICATION, PT 4, 2011, 227 : 259 - 267