共 50 条
- [21] AppGuard: A Hardware Virtualization Based Approach on Protecting User Applications from Untrusted Commodity Operating System 2015 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2015, : 685 - 689
- [22] Extending tamper-proof hardware security to untrusted execution environments USENIX ASSOCIATION AND IFIP WG 8.8 (SMART CARDS) PROCEEDINGS OF CARDIS '02 FIFTH SMART CARD RESEARCH AND ADVANCED APPLICATION CONFERENCE, 2002, : 111 - 123
- [23] Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 159 - 172
- [24] Efficient Secure Two-Party Computation with Untrusted Hardware Tokens TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, : 367 - 386
- [26] The Research of Software Components Trustworthy Evaluation Method ICAIE 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND EDUCATION, VOLS 1 AND 2, 2009, : 241 - 246
- [28] Reference Model of Trustworthy Proof for Trusted Components 2009 SECOND INTERNATIONAL CONFERENCE ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, FITME 2009, 2009, : 136 - +