共 50 条
- [41] Researches to the Trusted Ubiquitous Computing 2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 433 - 437
- [44] Building trusted sub-domain for the Grid with trusted computing INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 463 - +
- [45] TRUSTED ILLIAC:: A configurable hardware framework for a trusted computing base HASE 2007: 10TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2007, : 3 - 3
- [46] Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing 2010 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS ICCE, 2010,
- [47] Trusted code remote execution through trusted computing and virtualization SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 39 - +
- [48] Enforcing trust in pervasive computing with trusted computing technology CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 195 - +
- [50] The Trusted Computing exemplary with Astonishing Security for Cloud Computing INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (01): : 206 - 209