1.
Design Secure Architecture to Defend Computer Based on Trusted Computing
基于可信计算的计算机安全防护体系设计
2.
Peer-to-Peer Anonymous Communication Network Based on Trusted Computing
基于可信计算的P2P匿名通信系统
3.
Application and Research of the Trusted Measurement Mechanism on Trusted Computing Platform;
可信计算平台可信度量机制的应用与研究
4.
The Research of the Trusted Computing System Based on the Lenovo s Security Chip;
基于“恒智”芯片的可信计算系统的研究
5.
Trusted Computing And Its Illumination to Security Of Ad Hoc Network;
可信计算及其对Ad Hoc网络安全的启发
6.
Response Method for TOCTOU Attack in Trusted Computing Platform
可信计算平台中TOCTOU攻击的响应方法
7.
Authentication scheme based on trusted computing of preventing phishing attacks
基于可信计算的防网络欺诈认证方案
8.
Implementation of Direct Anonymous Attestation Scheme Based on Trusted Platform Module
一种可信计算环境下DAA协议实现方案
9.
Study of Remote Automated Anonymous Attestation in Trusted Computing
可信计算中远程自动匿名证明的研究
10.
Novel VPN Authentication Scheme Based on Trusted Computing
一种基于可信计算的VPN接入认证方案
11.
Improvement Scheme on AIK Generation in Trusted Computing
可信计算中AIK密钥生成改进方案
12.
New Anonymous Authentication Scheme for Trusted Computing Platform
一种新的可信计算平台匿名认证方案
13.
The Canetti-Krawczyk Model Under the Trusted Computation
可信计算环境下的Canetti-Krawczyk模型
14.
Testing on Trust Chain of Trusted Computing Platform Based on Labeled Transition System
基于标记变迁系统的可信计算平台信任链测试
15.
Metric and Method of Trust Measurement in Trust Chain of Trusted Comupting Platform;
可信计算平台中信任链的可信赖性度量指标与方法研究
16.
Authenticate as computer when computer information is available
当计算机信息可用时身份验证为计算机
17.
Reliable reputation computing based on double-layer reputation and feedback mechanism
基于双层信誉和反馈机制的可信信誉计算
18.
Client computers can trust the following certificate stores:
客户端计算机可以信任下列证书存储: