共 50 条
- [1] A dynamic password mechanism based on trusted computing [J]. Liu, B. (lbt_lzmc@163.com), 1600, Huazhong University of Science and Technology (41):
- [4] A scheme based on trusted computing for terminal security [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
- [5] A Signature Scheme Based Trusted Computing Plat [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 356 - 359
- [6] Trusted Computing Based Mobile DRM Authentication Scheme [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
- [7] A User Authentication Scheme Based on Trusted Platform for Cloud Computing [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
- [8] An Improved Scheme of μTESLA Authentication based Trusted Computing Platform [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4711 - 4714
- [9] The trust measurement scheme in trusted computing [J]. Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 586 - 591
- [10] AN ENHANCED PASSWORD-BASED USER AUTHENTICATION SCHEME FOR GRID COMPUTING [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (7A): : 3751 - 3760