共 50 条
- [2] Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing [J]. 2010 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS ICCE, 2010,
- [3] Trusted Computing Based Mobile DRM Authentication Scheme [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
- [4] Content Protection based on Trusted computing in Mobile Terminal [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 192 - 195
- [5] Trusted computing-based security architecture for 4G mobile networks [J]. PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 251 - 255
- [6] Based on Trusted Computing Solutions for Mobile Payment Terminal Security [J]. NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 570 - 574
- [7] Implementation of a TCG-based trusted computing in mobile device [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2008, 5185 : 18 - 27
- [8] Research on Smart Mobile Terminal Security Technology Based on Trusted Computing [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 3278 - 3281