共 50 条
- [33] Security strategy of DRM based on trusted computing [J]. Journal of Computational Information Systems, 2011, 7 (09): : 3226 - 3234
- [34] Enhancing grid security using trusted virtualization [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 372 - +
- [35] Trusted computing and advanced security in edge computing and Internet of Things [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (06):
- [38] A scheme based on trusted computing for terminal security [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
- [39] A Trusted Computing Technology for The Security of Mobile Agent [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS I AND II, 2009, : 124 - 127
- [40] Cloud Computing: Cloud Security to Trusted Cloud [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600