共 50 条
- [1] Enforcing trust in pervasive computing with trusted computing technology CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 195 - +
- [2] Safeguarding personal data using trusted computing in pervasive computing PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING, 2005, 780 : 147 - 155
- [3] Secure pervasive computing without a Trusted Third Party IEEE/ACS INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2004, : 240 - 240
- [4] A Study of Trust & Privacy Models in Pervasive Computing Approach to Trusted Computing Platforms 2009 INTERNATIONAL CONFERENCE FOR TECHNICAL POSTGRADUATES (TECHPOS 2009), 2009, : 140 - +
- [5] Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02): : 2755 - 2769
- [6] Information Hiding for Pervasive Trusted Authentication JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 653 - 656
- [8] Pervasive computing COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2001, 35 (04): : 371 - 371
- [10] Challenges for Trusted Computing CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 414 - 414