共 50 条
- [21] Rethinking General-Purpose Decentralized Computing [J]. PROCEEDINGS OF THE WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS (HOTOS '19), 2019, : 105 - 112
- [23] Awesome Trusted Execution Environment [J]. 2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 5 - 6
- [24] Trusted Execution on Leaky Hardware? [J]. PROCEEDINGS OF THE 3RD WORKSHOP ON SYSTEM SOFTWARE FOR TRUSTED EXECUTION (SYSTEX'18), 2018, : 1 - 1
- [25] A Trusted Remote Attestation Model based on Trusted Computing [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509
- [26] Trusted computing, trusted third parties, and verified communications [J]. SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 291 - 308
- [27] Trusted mobile devices: Requirements for a mobile Trusted Platform Module [J]. McGill, K.N. (kathleen.mcgill@jhuapl.edu), 2013, John Hopkins University (32):
- [28] Research on trusted storage based on trusted computing platform [J]. Tongxin Xuebao, 2007, SUPPL. (117-120):
- [29] Challenges for Trusted Computing [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 414 - 414
- [30] Firmware of trusted channel based on the trusted platform control module [J]. 2013 6TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKS AND INTELLIGENT SYSTEMS (ICINIS), 2013, : 189 - 192