共 50 条
- [31] The Mobile Agent security enhanced by trusted computing technology [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1234 - 1237
- [32] Performing Trusted Computing Actively Using Isolated Security Processor [J]. PROCEEDINGS OF THE 1ST WORKSHOP ON SECURITY-ORIENTED DESIGNS OF COMPUTER ARCHITECTURES AND PROCESSORS (SECARCH'18), 2018, : 2 - 7
- [34] Trusted computing: Providing security for Peer-to-Peer networks [J]. FIFTH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2005, : 117 - 124
- [35] Wireless LAN Security Enhancement through Trusted Computing Technology [J]. APPLIED DECISIONS IN AREA OF MECHANICAL ENGINEERING AND INDUSTRIAL MANUFACTURING, 2014, 577 : 986 - +
- [36] Research on Gateway Security Isolation Technology based on Trusted Computing [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1656 - 1659
- [37] A new approach to multilevel security based on trusted computing platform [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2158 - +
- [39] Security communication model for vehicular clouds based on trusted computing [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2014, 42 (11): : 102 - 105
- [40] Daonity: An experience on enhancing grid security by trusted computing technology [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 227 - 235