共 50 条
- [41] Enforcing trust in pervasive computing with trusted computing technology [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 195 - +
- [42] Trusted computing and advanced security in edge computing and Internet of Things [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (06):
- [44] A scheme based on trusted computing for terminal security [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
- [46] Cloud Computing: Cloud Security to Trusted Cloud [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600
- [47] Research of Trusted Network Security Technology [J]. ADVANCES IN MECHANICAL ENGINEERING, PTS 1-3, 2011, 52-54 : 713 - +
- [48] The Role of Trusted Computing in Secure Agent Migration [J]. RCIS 2009: PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE, 2009, : 255 - +
- [49] Trusted mobile computing: An overview of existing solutions [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 596 - 612
- [50] Trusted Platforms to secure Mobile Cloud Computing [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 1068 - 1075