共 50 条
- [1] Based on Trusted Computing Solutions for Mobile Payment Terminal Security [J]. NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 570 - 574
- [2] Research on Smart Mobile Terminal Security Technology Based on Trusted Computing [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 3278 - 3281
- [3] An enhanced scheme of enforcing DTE security policy based on trusted computing technology [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3657 - +
- [4] Security Access of Power terminal on Trusted Computing in Smart Grid [J]. INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2659 - 2664
- [5] WLAN Mesh security association scheme in trusted computing environment [J]. Tongxin Xuebao/Journal on Communications, 2014, 35 (07): : 94 - 103
- [6] Security strategy of DRM based on trusted computing [J]. Journal of Computational Information Systems, 2011, 7 (09): : 3226 - 3234
- [7] A Signature Scheme Based Trusted Computing Plat [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 356 - 359
- [8] Password management scheme based on trusted computing [J]. Beijing Youdian Daxue Xuebao, 2008, 5 (93-97):
- [10] Content Protection based on Trusted computing in Mobile Terminal [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 192 - 195