共 50 条
- [44] Building trusted sub-domain for the Grid with trusted computing INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 463 - +
- [45] TRUSTED ILLIAC:: A configurable hardware framework for a trusted computing base HASE 2007: 10TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2007, : 3 - 3
- [46] Trusted code remote execution through trusted computing and virtualization SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 39 - +
- [47] Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing 2010 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS ICCE, 2010,
- [48] Enforcing trust in pervasive computing with trusted computing technology CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 195 - +
- [49] The Trusted Computing exemplary with Astonishing Security for Cloud Computing INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (01): : 206 - 209
- [50] The Trusted Execution Module: Commodity general-purpose trusted computing SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2008, 5189 : 133 - 148