共 50 条
- [1] A Trusted Computing Architecture for Critical Infrastructure Protection [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 64 - 69
- [3] Integrated Trusted Protection Technologies for Industrial Control Systems [J]. 2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 70 - 75
- [4] Protection of Identity Information in Cloud Computing without Trusted Third Party [J]. 2010 29TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS SRDS 2010, 2010, : 368 - 372
- [6] A security model to protect sensitive information flows based on trusted computing technologies [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3646 - +
- [9] Cloud Computing Security Challenges and Critical Technologies of Its Protection [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 372 - 377