共 50 条
- [31] A trusted evidence collection method based on the trusted third-party for cloud platform Int. J. Simul. Syst. Sci. Technol., 25
- [32] Key management in trusted disk based on TPCM Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2): : 35 - 39
- [33] A User Authentication Scheme Based on Trusted Platform for Cloud Computing SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
- [34] A Design of the Trusted Platform Module Based on Multi-Core Processor 2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 3, 2011, : 538 - 541
- [35] RAVS: Remote attestation of video security based on trusted platform module Ma, Q. (maqiang_my@163.com), 1600, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (09):
- [36] A Method based on Platform Integrity Verification for Activating A Mobile Trusted Module 2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 1174 - 1176
- [38] Versatile Key Management for Secure Cloud Storage 2012 31ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2012), 2012, : 469 - 474
- [39] Scalable Key Management for Distributed Cloud Storage 2018 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2018), 2018, : 250 - 256
- [40] Portable Key Management Service for Cloud Storage PROCEEDINGS OF THE 2012 8TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM 2012), 2012, : 147 - 156