共 50 条
- [1] Direct anonymous authentication scheme for wireless networks under trusted computing [J]. Tongxin Xuebao/Journal on Communications, 2010, 31 (08): : 98 - 104
- [2] Anonymous RFID Authentication Using Trusted Computing Technologies [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 91 - 102
- [3] Content Protection based on Trusted computing in Mobile Terminal [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 192 - 195
- [4] An efficient anonymous remote attestation scheme for trusted computing based on improved CPK [J]. Electronic Commerce Research, 2019, 19 : 689 - 718
- [7] The connection anonymous scheme of trusted network [J]. Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 597 - 600
- [8] A robust digital image watermarking scheme for content protection [J]. Journal of Network Intelligence, 2020, 5 (02): : 54 - 61
- [9] AN ANONYMOUS REMOTE ATTESTATION FOR TRUSTED CLOUD COMPUTING [J]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 426 - 429
- [10] A remote anonymous attestation protocol in trusted computing [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-8, 2008, : 3688 - 3693