共 50 条
- [41] TrustedDB: A Trusted Hardware based Outsourced Database Engine PROCEEDINGS OF THE VLDB ENDOWMENT, 2011, 4 (12): : 1359 - 1362
- [42] Security strategy of DRM based on trusted computing Journal of Computational Information Systems, 2011, 7 (09): : 3226 - 3234
- [43] New access model and implementation of trusted network based on trusted certificate Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (02): : 496 - 500
- [44] A trusted computing model based on code authorization 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 495 - +
- [46] A scheme based on trusted computing for terminal security PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
- [47] A Secure Trust Model Based on Trusted Computing 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 170 - 176
- [48] Study on Access Control Based on Trusted Computing MACHINERY ELECTRONICS AND CONTROL ENGINEERING III, 2014, 441 : 980 - +
- [49] Password management scheme based on trusted computing Beijing Youdian Daxue Xuebao, 2008, 5 (93-97):
- [50] A Signature Scheme Based Trusted Computing Plat MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 356 - 359