共 50 条
- [3] Daonity: An experience on enhancing grid security by trusted computing technology [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 227 - 235
- [4] Wireless LAN Security Enhancement through Trusted Computing Technology [J]. APPLIED DECISIONS IN AREA OF MECHANICAL ENGINEERING AND INDUSTRIAL MANUFACTURING, 2014, 577 : 986 - +
- [5] A Security Technology for Mobile Agent System Improved by Trusted Computing Platform [J]. HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 3, PROCEEDINGS, 2009, : 46 - +
- [6] Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks [J]. APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, : 43 - +
- [7] Decentralized Trusted Computing Base for Blockchain Infrastructure Security [J]. FRONTIERS IN BLOCKCHAIN, 2019, 2
- [8] Research on Gateway Security Isolation Technology based on Trusted Computing [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1656 - 1659
- [10] Trusted grid computing with security assurance and resource optimization [J]. PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 110 - 117