共 50 条
- [1] Mobile Security and Trusted Computing [J]. IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 321 - 326
- [4] An Efficient Security Architecture for Trusted Computing [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 599 - 601
- [5] OSLO: Improving the security of trusted computing [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 229 - 237
- [7] The Trusted Computing exemplary with Astonishing Security for Cloud Computing [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (01): : 206 - 209
- [8] Security strategy of DRM based on trusted computing [J]. Journal of Computational Information Systems, 2011, 7 (09): : 3226 - 3234
- [9] Trusted computing and advanced security in edge computing and Internet of Things [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (06):