Password management scheme based on trusted computing

被引:0
|
作者
National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China [1 ]
机构
来源
Beijing Youdian Daxue Xuebao | 2008年 / 5卷 / 93-97期
关键词
Trusted computing;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] A dynamic password mechanism based on trusted computing
    [J]. Liu, B. (lbt_lzmc@163.com), 1600, Huazhong University of Science and Technology (41):
  • [2] Mutual authentication scheme with smart cards and password under trusted computing
    Yang, Li
    Ma, Jian-Feng
    Jiang, Qi
    [J]. International Journal of Network Security, 2012, 14 (03) : 156 - 163
  • [3] A Blockchain-Based Trusted Data Management Scheme in Edge Computing
    Ma Zhaofeng
    Wang Xiaochang
    Jain, Deepak Kumar
    Khan, Haneef
    Gao Hongmin
    Wang Zhen
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 2013 - 2021
  • [4] A scheme based on trusted computing for terminal security
    Zhang, Jun
    Liu, Wei-peng
    Zhou, Zheng
    Li, Jian
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
  • [5] A Signature Scheme Based Trusted Computing Plat
    Jiao, Hongqiang
    Zhang, Yanjun
    Li, Hui
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 356 - 359
  • [6] Trusted Computing Based Mobile DRM Authentication Scheme
    Yang, Zhen
    Fan, Kefeng
    Lai, Yingxu
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
  • [7] A User Authentication Scheme Based on Trusted Platform for Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
  • [8] An Improved Scheme of μTESLA Authentication based Trusted Computing Platform
    Du, Ruiying
    Wen, Song
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4711 - 4714
  • [9] The trust measurement scheme in trusted computing
    Zhang, Li-Qiang
    Zhang, Huan-Guo
    Zhang, Fan
    [J]. Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 586 - 591
  • [10] AN ENHANCED PASSWORD-BASED USER AUTHENTICATION SCHEME FOR GRID COMPUTING
    Wu, Zhen-Yu
    Chung, Yufang
    Lai, Feipei
    Chen, Tzer-Shyong
    Lee, Hung-Chang
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (7A): : 3751 - 3760