共 50 条
- [21] ECC-Based Threshold Digital Signature Scheme without a Trusted Party 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 851 - 855
- [22] A trusted group signature architecture in virtual computing environment AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2008, 5060 : 73 - 85
- [23] An enhanced scheme of enforcing DTE security policy based on trusted computing technology PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3657 - +
- [24] A Trusted Third Party-Based Key Agreement Scheme in Cloud Computing INTELLIGENCE SCIENCE AND BIG DATA ENGINEERING: BIG DATA AND MACHINE LEARNING TECHNIQUES, ISCIDE 2015, PT II, 2015, 9243 : 407 - 412
- [25] A Portable TPM Scheme for General-purpose Trusted Computing Based on EFI MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 140 - +
- [28] An efficient anonymous remote attestation scheme for trusted computing based on improved CPK Electronic Commerce Research, 2019, 19 : 689 - 718
- [29] Scheme for (T, N) threshold ID-based signature without a trusted dealer 2007 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, VOLS 1-4, PROCEEDINGS, 2007, : 1341 - 1345
- [30] A Trusted Remote Attestation Model based on Trusted Computing 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509