咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 4 篇 计算机科学与技术...
    • 4 篇 网络空间安全
    • 1 篇 软件工程

主题

  • 5 篇 trusted computin...
  • 2 篇 authentication
  • 2 篇 information secu...
  • 2 篇 trusted computin...
  • 1 篇 trusted platform...
  • 1 篇 identity delegat...
  • 1 篇 merkle tree
  • 1 篇 direct anonymous...
  • 1 篇 digital signatur...
  • 1 篇 privacy
  • 1 篇 testing and eval...
  • 1 篇 mobile agent
  • 1 篇 trusted network ...
  • 1 篇 trustworthy soft...
  • 1 篇 one-time signatu...
  • 1 篇 bilinear map

机构

  • 1 篇 school of comput...
  • 1 篇 college of compu...
  • 1 篇 1. school of com...
  • 1 篇 1. beijing unive...
  • 1 篇 college of compu...
  • 1 篇 institute of com...

作者

  • 1 篇 shen changxiang1...
  • 1 篇 2. institute of ...
  • 1 篇 zhang huanguo1 2...
  • 1 篇 3school of compu...
  • 1 篇 3. school of com...
  • 1 篇 2key laboratory ...
  • 1 篇 tan liang1 2 zho...
  • 1 篇 zhidong shen int...
  • 1 篇 430079 xiaoping ...
  • 1 篇 china
  • 1 篇 2school of compu...
  • 1 篇 wang xiaofei hon...

语言

  • 5 篇 英文
检索条件"主题词=Trusted Computing Platform"
5 条 记 录,以下是1-10 订阅
排序:
Research on theory and key technology of trusted computing platform security testing and evaluation
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 434-453页
作者: ZHANG HuanGuo1,2, YAN Fei1,2, FU JianMing1,2, XU MingDi1,2, YANG Yang1,2, HE Fan1,2 & ZHAN Jing1,2 1School of Computer, Wuhan University, Wuhan 430072, China 2Key Laboratory of Aerospace Information Security and trusted computing, Ministry of Education, Wuhan 430072, China 1. School of Computer Wuhan University Wuhan 430072 China2. Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan 430072 China
trusted computing has become a new trend in the area of international information security, and the products of trusted computing platform begin to be used in application. Users will not use the products of informatio... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Merkle Tree Digital Signature and trusted computing platform
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1467-1472页
作者: WANG Xiaofei HONG Fan TANG Xueming CUI Guohua College of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 Hubei China
Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signatu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The Authentication and Identity Delegation about Mobile Agent System based on trusted computing platform
The Authentication and Identity Delegation about Mobile Agen...
收藏 引用
2010 3rd IEEE International Conference on Computer Science and Information Technology—ICCSIT 2010
作者: Zhidong Shen International School of Software State Key Laboratory of Software Engineering Wuhan University Wuhan China 430079 Xiaoping Wu School of Computer Wuhan University Wuhan China 430079
In the mobile agent system, the authentication and identity delegation of mobile agents are the important security problem. This paper focuses on the issues faced by a relying party when deciding to trust a CA and the... 详细信息
来源: cnki会议 评论
Research on trusted computing and its development
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 405-433页
作者: SHEN ChangXiang1, ZHANG HuanGuo1?, WANG HuaiMin3, WANG Ji3, ZHAO Bo2, YAN Fei2, YU FaJiang2, ZHANG LiQiang2 & XU MingDi21Beijing University of Technology, Beijing 100124, China 2School of Computer, Wuhan University, Key Laboratory of Aerospace Information Security and trusted computing of Ministry of Education, Wuhan 430072, China 3School of Computer, National University of Defence Technology, Changsha 430074, China 1. Beijing University of Technology Beijing 100124 China3. School of Computer National University of Defence Technology Changsha 430074 China2. Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education School of Computer Wuhan University Wuhan 430072 China
trusted computing is a novel technology of information system security. It has become a new tide in worldwide information security area and achieved inspiring accomplishment. In China, the initiative research of trust... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A New Process and Framework for Direct Anonymous Attestation Based on Symmetric Bilinear Maps
收藏 引用
Wuhan University Journal of Natural Sciences 2011年 第5期16卷 369-375页
作者: TAN Liang1,2, ZHOU Mingtian3 1. College of Computer/Key Lab of Visualization in Scientific computing and Virtual Reality of Sichuan, Sichuan Normal University, Chengdu 610066, Sichuan, China 2. Institute of computing Technology, Chinese Academy of Sciences, Beijing 100190, China 3. School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, Sichuan, China College of Computer/Key Lab of Visualization in Scientific computing and Virtual Reality of Sichuan Sichuan Normal University Chengdu Sichuan China Institute of computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu Sichuan China
For the problem of the original direct anonymous attestation (DAA) scheme's complexity and great time consumption, a new DAA scheme based on symmetric bilinear pairings is presented, which gives a practical solutio... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论