-
1
Trusted coalition-proof protocol model based on secure multi-part computing
Published 2011-01-01Subjects: Get full text
Article -
2
5G defense network using commercial gNodeB with zero trust architecture
Published 2025-06-01Subjects: Get full text
Article -
3
Application progress of SGX in trusted computing area
Published 2021-12-01Subjects: “…trusted computing…”
Get full text
Article -
4
Noninterference model for integrity
Published 2011-01-01Subjects: “…noninterference;integrity;confidentiality;information security;trusted computing…”
Get full text
Article -
5
-
6
Trusted computing mobile terminal application research based on biometric trusted access protocol
Published 2017-02-01Subjects: Get full text
Article -
7
Trusted virtual machine management model for cloud computing
Published 2014-11-01Subjects: Get full text
Article -
8
Design and validation for a remote attestation security protocol
Published 2009-01-01Subjects: “…trusted computing;remote attestation;security protocol;CSP…”
Get full text
Article -
9
An Improved Summary–Explanation Method for Promoting Trust Through Greater Support with Application to Credit Evaluation Systems
Published 2025-04-01Subjects: Get full text
Article -
10
Model checking of trusted cryptographic module
Published 2010-01-01Subjects: “…trusted computing platform…”
Get full text
Article -
11
Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs
Published 2025-07-01Subjects: Get full text
Article -
12
Trusted platform for third-party cloud computing online evaluation and analysis technology
Published 2019-10-01Subjects: Get full text
Article -
13
Approach on runtime monitoring based on the embedded trusted platforms
Published 2017-10-01Subjects: “…trusted computing…”
Get full text
Article -
14
Research of platform identity attestation based on trusted chip
Published 2014-08-01Subjects: “…trusted computing;platform identity attestation;protocol composition logic;anonymity…”
Get full text
Article -
15
Research on key management and authentication protocol of PDA in smart grid
Published 2018-03-01Subjects: Get full text
Article -
16
Trusted access scheme for intranet mobile terminal based on encrypted SD card
Published 2019-08-01Subjects: Get full text
Article -
17
Research of platform identity attestation based on trusted chip
Published 2014-08-01Subjects: “…trusted computing…”
Get full text
Article -
18
Guiding the security protection of critical information infrastructure with scientific network security concept
Published 2019-09-01Subjects: Get full text
Article -
19
Trusted auditing method of virtual machine based on improved expectation decision method
Published 2018-06-01Subjects: Get full text
Article -
20
Label-based protection scheme of vTPM secret
Published 2018-11-01Subjects: “…trusted computing…”
Get full text
Article