Study and application of trusted computing technology
From MaRDI portal
Publication:3445656
zbMATH Open1122.68734MaRDI QIDQ3445656FDOQ3445656
Authors: Xinkun Yang, Wei Wang, Jinbo Yang
Publication date: 12 June 2007
Recommendations
Cited In (17)
- Trusted connection protocol between networks
- A separated domain-based kernel model for trusted computing
- Architecture of trusted PC
- Protecting terminals by security domain mechanism based on trusted computing
- The mechanism about key and credential on trusted computing platform and the application study
- Trustworthiness technologies of DDSS
- Title not available (Why is that?)
- Information Security and Privacy
- Research on cryptology mechanism of trusted computing platform module
- An improved cryptology mechanism of trusted computing platform
- Trusted launch of virtual machine instances in public IaaS environments
- Title not available (Why is that?)
- Formal Techniques for Networked and Distributed Systems – FORTE 2004
- Digital forensics of trusted computing environment
- A potential approach of internet worm propagation based on P2P
- Title not available (Why is that?)
- Development of trusted computing research
This page was built for publication: Study and application of trusted computing technology
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3445656)