共 50 条
- [2] A scheme based on trusted computing for terminal security PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
- [3] Password management scheme based on trusted computing Beijing Youdian Daxue Xuebao, 2008, 5 (93-97):
- [4] Trusted Computing Based Mobile DRM Authentication Scheme FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
- [5] ID-based signature scheme without trusted PKG INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 53 - 62
- [7] A Signature Scheme Based on the Intractability of Computing Roots Designs, Codes and Cryptography, 2002, 25 : 223 - 236
- [8] A User Authentication Scheme Based on Trusted Platform for Cloud Computing SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
- [9] An Improved Scheme of μTESLA Authentication based Trusted Computing Platform 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4711 - 4714
- [10] The trust measurement scheme in trusted computing Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 586 - 591