共 50 条
- [3] A New Trusted Application Platform Architecture based on TPM [J]. 2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 73 - 77
- [4] Trusted Software Behavior Monitoring Model Based on Agent [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRIAL ENGINEERING (AIIE 2016), 2016, 133 : 420 - 423
- [5] Hierarchical and Dynamic Trusted Evaluation Model Based on Agent [J]. PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 312 - +
- [6] The Authentication and Identity Delegation about Mobile Agent System based on Trusted Computing Platform [J]. ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2010, : 672 - 676
- [7] Research and application of trusted computing platform based on portable TPM [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 506 - 509
- [8] A Novel Trusted Boot Model for Embedded Smart Device without TPM [J]. 2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 228 - +
- [9] TPM-Based Authentication Mechanism for Apache Hadoop [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 105 - 122
- [10] A new information measurement scheme based on TPM for trusted network access [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 506 - +