Implementation of trusted computing in commercial cryptogram based on hardware

被引:0
|
作者
Zhao, Bo
Liu, Shubo
Tang, Ming
Zhang, Huanguo
机构
来源
Wuhan Daxue Xuebao (Xinxi Kexue Ban)/Geomatics and Information Science of Wuhan University | 2004年 / 29卷 / 11期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
No abstract available
引用
收藏
相关论文
共 50 条
  • [41] TrustedDB: A Trusted Hardware based Outsourced Database Engine
    Bajaj, Sumeet
    Sion, Radu
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2011, 4 (12): : 1359 - 1362
  • [42] Security strategy of DRM based on trusted computing
    Yan, Jianhong
    Peng, Xinguang
    Journal of Computational Information Systems, 2011, 7 (09): : 3226 - 3234
  • [43] New access model and implementation of trusted network based on trusted certificate
    Wei, Da
    Jia, Xiang-Peng
    Wang, Jian
    Liu, Yan-Heng
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (02): : 496 - 500
  • [44] A trusted computing model based on code authorization
    Wei, Guoheng
    Zhou, Xueguang
    Zhang, Huanguo
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 495 - +
  • [45] Improved Biba model based on trusted computing
    Liu, Gang
    Zhang, Jing
    Liu, Jinhui
    Zhang, Yuan
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2793 - 2797
  • [46] A scheme based on trusted computing for terminal security
    Zhang, Jun
    Liu, Wei-peng
    Zhou, Zheng
    Li, Jian
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
  • [47] A Secure Trust Model Based on Trusted Computing
    Yin Zhixi
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 170 - 176
  • [48] Study on Access Control Based on Trusted Computing
    Ma, Xinqiang
    Huang, Yi
    Bo Lv
    MACHINERY ELECTRONICS AND CONTROL ENGINEERING III, 2014, 441 : 980 - +
  • [49] Password management scheme based on trusted computing
    National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
    Beijing Youdian Daxue Xuebao, 2008, 5 (93-97):
  • [50] A Signature Scheme Based Trusted Computing Plat
    Jiao, Hongqiang
    Zhang, Yanjun
    Li, Hui
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 356 - 359