ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Trusted computing
PsycEXTRA Dataset
◽
10.1037/e579152011-016
◽
2005
◽
Author(s):
R. Jason Weiss
Keyword(s):
Trusted Computing
Download Full-text
Related Documents
Cited By
References
Study of Remote Automated Anonymous Attestation in Trusted Computing
Chinese Journal of Computers
◽
10.3724/sp.j.1016.2009.01304
◽
2009
◽
Vol 32
(7)
◽
pp. 1304-1310
◽
Cited By ~ 6
Author(s):
Ji-Qiang LIU
◽
Jia ZHAO
◽
Yong ZHAO
Keyword(s):
Trusted Computing
Download Full-text
Security Analysis on Trust Chain of Trusted Computing Platform
Chinese Journal of Computers
◽
10.3724/sp.j.1016.2010.01165
◽
2010
◽
Vol 33
(7)
◽
pp. 1165-1176
◽
Cited By ~ 2
Author(s):
Ming-Di XU
◽
Huan-Guo ZHANG
◽
Heng ZHAO
◽
Jun-Lin LI
◽
Fei YAN
Keyword(s):
Trusted Computing
◽
Security Analysis
◽
Computing Platform
◽
Trusted Computing Platform
◽
Trust Chain
Download Full-text
Study on development of trusted computing
Journal of Computer Applications
◽
10.3724/sp.j.1087.2009.00920
◽
2009
◽
Vol 29
(4)
◽
pp. 920-923
◽
Cited By ~ 1
Author(s):
Xin-qiang MA
◽
Yi HUANG
◽
Dan-ning LI
Keyword(s):
Trusted Computing
Download Full-text
Research on cryptology mechanism of trusted computing platform module
Journal of Computer Applications
◽
10.3724/sp.j.1087.2008.01907
◽
2008
◽
Vol 28
(8)
◽
pp. 1907-1911
Author(s):
Jie LUO
Keyword(s):
Trusted Computing
◽
Computing Platform
◽
Trusted Computing Platform
Download Full-text
Study of the Use of Ada in Trusted Computing Bases (TCBs) to be Certified at, or Below, the B3 Level
10.21236/ada223067
◽
1989
◽
Author(s):
IIT RESEARCH INST LANHAM MD
Keyword(s):
Trusted Computing
Download Full-text
Information Hiding based Trusted Computing System Design
10.21236/ada608967
◽
2014
◽
Author(s):
Gang Qu
◽
Min Wu
Keyword(s):
System Design
◽
Information Hiding
◽
Trusted Computing
◽
Computing System
Download Full-text
'Trusted' computing - technologies, opportunities and problems
IET Conference on Crime and Security
◽
10.1049/ic:20060317
◽
2006
◽
Author(s):
A. Cox
Keyword(s):
Trusted Computing
◽
Computing Technologies
Download Full-text
Design of Terminal Security Access Scheme based on Trusted Computing in Ubiquitous Electric Internet of Things
2020 IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC)
◽
10.1109/itaic49862.2020.9339022
◽
2020
◽
Author(s):
Guodong Wang
◽
Dongbo Tian
◽
Fengqiang Gu
◽
Jia Li
◽
Yang Lu
Keyword(s):
Internet Of Things
◽
Trusted Computing
◽
Access Scheme
Download Full-text
Towards platform-independent trusted computing
Proceedings of the 2009 ACM workshop on Scalable trusted computing - STC '09
◽
10.1145/1655108.1655119
◽
2009
◽
Cited By ~ 4
Author(s):
Ronald Toegl
◽
Thomas Winkler
◽
Mohammad Nauman
◽
Theodore Hong
Keyword(s):
Trusted Computing
Download Full-text
Construction of embedded secure terminal and multimedia database based on trusted computing technology and wireless network
Alexandria Engineering Journal
◽
10.1016/j.aej.2021.02.020
◽
2021
◽
Vol 60
(5)
◽
pp. 4223-4230
Author(s):
Kun Xiao
Keyword(s):
Wireless Network
◽
Trusted Computing
◽
Multimedia Database
◽
Computing Technology
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close