共 50 条
- [2] New access model and implementation of trusted network based on trusted certificate [J]. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (02): : 496 - 500
- [3] Trusted data access and authorization protocol [J]. Journal of China Universities of Posts and Telecommunications, 2021, 28 (05): : 18 - 26
- [6] ON THE IMPLEMENTATION OF PROTOTYPE SYSTEM FOR WIRELESS NETWORK'S TRUSTED ACCESS ARCHITECTURE [J]. PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND APPLICATIONS, 2009, : 246 - +
- [8] Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing [J]. 2010 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS ICCE, 2010,
- [9] Implementation Aspects of Mobile and Embedded Trusted Computing [J]. TRUSTED COMPUTING, PROCEEDINGS, 2009, 5471 : 29 - 44