The mechanism about key and credential on trusted computing platform and the application study
From MaRDI portal
Publication:3443245
Recommendations
Cited in
(13)- A separated domain-based kernel model for trusted computing
- Implementing operating system support for extended trusted path in TPM-capable environments
- Protecting terminals by security domain mechanism based on trusted computing
- Trustworthiness technologies of DDSS
- Research on cryptology mechanism of trusted computing platform module
- An improved cryptology mechanism of trusted computing platform
- Design and formal analysis of TCM key migration protocols
- Single sign-on using trusted platforms
- Digital forensics of trusted computing environment
- Study and application of trusted computing technology
- scientific article; zbMATH DE number 2146561 (Why is no real title available?)
- Development of trusted computing research
- Coded circuit for trusted computing: towards dynamic integrity measurement
This page was built for publication: The mechanism about key and credential on trusted computing platform and the application study
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3443245)