共 50 条
- [1] Pervasive Trusted Computing [J]. SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 88 - +
- [2] Enforcing trust in pervasive computing with trusted computing technology [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 195 - +
- [3] Personal Projectors for Pervasive Computing [J]. IEEE PERVASIVE COMPUTING, 2012, 11 (02) : 30 - 37
- [4] Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02): : 2755 - 2769
- [5] A Study of Trust & Privacy Models in Pervasive Computing Approach to Trusted Computing Platforms [J]. 2009 INTERNATIONAL CONFERENCE FOR TECHNICAL POSTGRADUATES (TECHPOS 2009), 2009, : 140 - +
- [6] Secure pervasive computing without a Trusted Third Party [J]. IEEE/ACS INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2004, : 240 - 240
- [7] Challenges of Using Trusted Computing for Collaborative Data Processing [J]. SECURITY AND TRUST MANAGEMENT, STM 2019, 2019, 11738 : 107 - 123
- [10] Secure data management in trusted computing [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2005, PROCEEDINGS, 2005, 3659 : 324 - 338