TRUSTED COMPUTING AND INFORMATION SECURITY

被引:0
|
作者
Zhang Huanguo [1 ,2 ,3 ]
Mu Yi [4 ]
机构
[1] Xidian Univ, Xian, Peoples R China
[2] Wuhan Univ, Wuhan, Peoples R China
[3] Xidian Univ, Xian, Peoples R China
[4] Univ Wollongong, Wollongong, NSW 2522, Australia
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
引用
收藏
页码:IX / X
页数:2
相关论文
共 50 条
  • [31] The Mobile Agent security enhanced by trusted computing technology
    Wu, Xiaoping
    Shen, Zhidong
    Zhang, Huanguo
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1234 - 1237
  • [32] Performing Trusted Computing Actively Using Isolated Security Processor
    Jia, Xiaoqi
    He, Yun
    Wu, Xiyao
    Sun, Huiqi
    [J]. PROCEEDINGS OF THE 1ST WORKSHOP ON SECURITY-ORIENTED DESIGNS OF COMPUTER ARCHITECTURES AND PROCESSORS (SECARCH'18), 2018, : 2 - 7
  • [33] Protecting Terminals by Security Domain Mechanism Based on Trusted Computing
    ZHOU Zheng~1
    2. Institute of Electronic Technology
    3. Naval Institute of Computing Technology
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1437 - 1440
  • [34] Trusted computing: Providing security for Peer-to-Peer networks
    Balfe, S
    Lakhani, AD
    Paterson, KG
    [J]. FIFTH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2005, : 117 - 124
  • [35] Wireless LAN Security Enhancement through Trusted Computing Technology
    She, Xinping
    Xu, Jianming
    [J]. APPLIED DECISIONS IN AREA OF MECHANICAL ENGINEERING AND INDUSTRIAL MANUFACTURING, 2014, 577 : 986 - +
  • [36] Research on Gateway Security Isolation Technology based on Trusted Computing
    Mao, Jiangkun
    Xu, Yufeng
    [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1656 - 1659
  • [37] A new approach to multilevel security based on trusted computing platform
    Zuo, Xiao-Dong
    Liu, Feng-Mei
    Ma, Chao-Bin
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2158 - +
  • [38] Encryption key management as a trusted security as a service for cloud computing
    Fehis, Saad
    Nouali, Omar
    Kechadi, Mohand-Tahar
    [J]. International Journal of Security and Networks, 2021, 16 (03) : 150 - 162
  • [39] Security communication model for vehicular clouds based on trusted computing
    Zhang, Wenbo
    Bao, Zhenshan
    Li, Jian
    Zhan, Jing
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2014, 42 (11): : 102 - 105
  • [40] Daonity: An experience on enhancing grid security by trusted computing technology
    Yan, Fei
    Qiang, Weizhong
    Shen, Zhidong
    Chen, Chunrun
    Zhang, Huanguo
    Zou, Deqing
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 227 - 235