共 50 条
- [41] TProv: Towards a Trusted Provenance-Aware Service Based on Trusted Computing WEB SERVICES - ICWS 2018, 2018, 10966 : 67 - 83
- [42] Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 240 - +
- [43] Identity Matrix: Architecture Framework for Trusted Cloud Computing through Cloud Intellect JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (04): : 643 - 651
- [44] Challenges for Trusted Computing CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 414 - 414
- [45] Trusted computing based user authentication for mobile equipment Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1255 - 1264
- [46] Distributed Trusted Computing for Blockchain-Based Crowdsourcing CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (03): : 2825 - 2842
- [47] Research on Trust Model Based on Behavior and Trusted Computing PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 1259 - 1263
- [48] Analysis and Research of Remote Attestation Based on Trusted Computing 2013 FOURTH INTERNATIONAL CONFERENCE ON DIGITAL MANUFACTURING AND AUTOMATION (ICDMA), 2013, : 192 - 195
- [49] Privacy and trusted computing 14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, : 383 - 388
- [50] PKI Mesh Trust Model Based on Trusted Computing PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1401 - 1405