共 50 条
- [24] A Trusted Remote Attestation Model based on Trusted Computing 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509
- [25] Trusted computing, trusted third parties, and verified communications SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 291 - 308
- [26] Research on trusted storage based on trusted computing platform Tongxin Xuebao, 2007, SUPPL. (117-120):
- [27] PISTIS: Trusted Computing Architecture for Low-end Embedded Systems PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3843 - 3860
- [28] CHORS: Hardening High-Assurance Security Systems with Trusted Computing 37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2022, : 1626 - 1635
- [29] Protected Computing vs. Trusted Computing 2006 1ST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2006, : 14 - +
- [30] Software for automotive systems: Model-integrated computing AUTOMOTIVE SOFTWARE-CONNECTED SERVICES IN MOBILE NETWORKS, 2004, 4147 : 116 - 136