共 50 条
- [33] Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 240 - +
- [35] Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI Frontiers of Computer Science in China, 2011, 5
- [36] The research of Trusted Computing based on the model of trusted Meta data of BSCM 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 941 - 945
- [37] Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2011, 5 (02): : 169 - 180
- [38] Hardware Implementation of Memristor-based In-Memory Computing for Classification Tasks 2024 IEEE 67TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, MWSCAS 2024, 2024, : 126 - 130
- [40] Identity anonymity for grid computing coordination based on trusted computing SIXTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2007, : 403 - +