共 50 条
- [41] Dynamic List Based Data Integrity Verification in Cloud Environment Journal of Cyber Security and Mobility, 2022, 11 (03): : 433 - 460
- [42] Detection method of trusted blockchain link flood attack based on trusted execution environment 2023 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY, ITIOTSC 2023, 2023, : 155 - 159
- [43] Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing TRUST AND TRUSTWORTHY COMPUTING, PROCEEDINGS, 2010, 6101 : 211 - 227
- [44] A novel method of APK-based automated execution and traversal with a trusted execution environment PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 254 - 258
- [45] The Research of Trusted Technology under Cloud Environment PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, : 231 - 235
- [47] Performance analysis of trusted security environment in cloud JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (03): : 657 - 666
- [48] T-YUN: Trustworthiness Verification and Audit on the Cloud Providers IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2013, E96D (11): : 2344 - 2353
- [49] HyperEnclave: An Open and Cross-platform Trusted Execution Environment PROCEEDINGS OF THE 2022 USENIX ANNUAL TECHNICAL CONFERENCE, 2022, : 437 - 454
- [50] DM-TEE: Trusted Execution Environment for Disaggregated Memory PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, 2024, : 204 - 209