共 50 条
- [31] A trustzone-based trusted code execution with strong security requirements Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2224 - 2238
- [33] Awesome Trusted Execution Environment 2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 5 - 6
- [34] Trusted Execution on Leaky Hardware? PROCEEDINGS OF THE 3RD WORKSHOP ON SYSTEM SOFTWARE FOR TRUSTED EXECUTION (SYSTEX'18), 2018, : 1 - 1
- [35] Trusted computing, trusted third parties, and verified communications SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 291 - 308
- [36] Research on trusted storage based on trusted computing platform Tongxin Xuebao, 2007, SUPPL. (117-120):
- [37] Challenges for Trusted Computing CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 414 - 414
- [38] Privacy and trusted computing 14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, : 383 - 388
- [39] Pervasive Trusted Computing SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 88 - +