共 50 条
- [21] A secure bootstrap based on trusted computing [J]. 2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 502 - 504
- [23] The research of Trusted Computing based on the model of trusted Meta data of BSCM [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 941 - 945
- [24] Identity anonymity for grid computing coordination based on trusted computing [J]. SIXTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2007, : 403 - +
- [25] An Integrated Architecture for Trusted Computing for Java']Java enabled Embedded Devices [J]. STC'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SCALABLE TRUSTED COMPUTING, 2007, : 2 - 6
- [26] PISTIS: Trusted Computing Architecture for Low-end Embedded Systems [J]. PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3843 - 3860
- [27] Security strategy of DRM based on trusted computing [J]. Journal of Computational Information Systems, 2011, 7 (09): : 3226 - 3234
- [28] A trusted computing model based on code authorization [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 495 - +
- [29] Improved Biba model based on trusted computing [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2793 - 2797
- [30] Study on Access Control Based on Trusted Computing [J]. MACHINERY ELECTRONICS AND CONTROL ENGINEERING III, 2014, 441 : 980 - +