咨询与建议

限定检索结果

文献类型

  • 47 篇 期刊文献
  • 7 篇 会议

馆藏范围

  • 54 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 54 篇 工学
    • 44 篇 计算机科学与技术...
    • 15 篇 网络空间安全
    • 11 篇 电气工程
    • 10 篇 信息与通信工程
    • 7 篇 电子科学与技术(可...
    • 4 篇 仪器科学与技术
    • 2 篇 机械工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 控制科学与工程
    • 1 篇 土木工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 林业工程
    • 1 篇 软件工程
  • 3 篇 理学
    • 3 篇 数学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 54 篇 trusted computin...
  • 7 篇 information secu...
  • 4 篇 trusted platform...
  • 3 篇 remote attestati...
  • 3 篇 trusted platform...
  • 3 篇 virtualization
  • 3 篇 access control
  • 3 篇 network security
  • 3 篇 cloud computing
  • 2 篇 chain of trust
  • 2 篇 immune code
  • 2 篇 separation kerne...
  • 2 篇 honey code
  • 2 篇 trust chain
  • 2 篇 trusted computin...
  • 2 篇 trusted mechanis...
  • 2 篇 trusted network ...
  • 2 篇 grid computing
  • 2 篇 dynamic integrit...
  • 2 篇 authentication

机构

  • 10 篇 school of comput...
  • 3 篇 naval institute ...
  • 2 篇 state key labora...
  • 2 篇 schoolofcomputer...
  • 2 篇 college of infor...
  • 2 篇 zhengzhou normal...
  • 1 篇 information secu...
  • 1 篇 beijing safe-cod...
  • 1 篇 huawei technolog...
  • 1 篇 institute of ele...
  • 1 篇 beijing electro-...
  • 1 篇 school of electr...
  • 1 篇 school of cyber ...
  • 1 篇 institute of net...
  • 1 篇 foundation of sc...
  • 1 篇 key laboratory o...
  • 1 篇 college of elect...
  • 1 篇 beijing universi...
  • 1 篇 school of comput...
  • 1 篇 department of in...

作者

  • 5 篇 zhang huanguo
  • 4 篇 shen changxiang
  • 3 篇 zhang liqiang
  • 2 篇 yan fei
  • 2 篇 yu fajiang
  • 2 篇 fang yanxiang
  • 2 篇 feng dengguo
  • 2 篇 chen lu
  • 1 篇 liu zhe
  • 1 篇 shen changxiang1...
  • 1 篇 田俊峰
  • 1 篇 weiyong yang
  • 1 篇 ma jianfeng
  • 1 篇 guo-ning lv
  • 1 篇 deng xin
  • 1 篇 zhang xiaojuan
  • 1 篇 zhang huanguo wa...
  • 1 篇 wei liu
  • 1 篇 meng ke
  • 1 篇 li song

语言

  • 44 篇 英文
  • 10 篇 中文
检索条件"主题词=trusted computing"
54 条 记 录,以下是1-10 订阅
排序:
Research on trusted computing and its development
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 405-433页
作者: SHEN ChangXiang1, ZHANG HuanGuo1?, WANG HuaiMin3, WANG Ji3, ZHAO Bo2, YAN Fei2, YU FaJiang2, ZHANG LiQiang2 & XU MingDi21Beijing University of Technology, Beijing 100124, China 2School of Computer, Wuhan University, Key Laboratory of Aerospace Information Security and trusted computing of Ministry of Education, Wuhan 430072, China 3School of Computer, National University of Defence Technology, Changsha 430074, China Beijing University of Technology Beijing China School of Computer National University of Defence Technology Changsha China Key Laboratory of Aerospace Information Security and trusted computing of Ministry of Education School of Computer Wuhan University Wuhan China
trusted computing is a novel technology of information system security. It has become a new tide in worldwide information security area and achieved inspiring accomplishment. In China, the initiative research of trust... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Research on theory and key technology of trusted computing platform security testing and evaluation
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 434-453页
作者: ZHANG HuanGuo1,2, YAN Fei1,2, FU JianMing1,2, XU MingDi1,2, YANG Yang1,2, HE Fan1,2 & ZHAN Jing1,2 1School of Computer, Wuhan University, Wuhan 430072, China 2Key Laboratory of Aerospace Information Security and trusted computing, Ministry of Education, Wuhan 430072, China School of Computer Wuhan University Wuhan China Key Laboratory of Aerospace Information Security and trusted computing Ministry of Education Wuhan China
trusted computing has become a new trend in the area of international information security, and the products of trusted computing platform begin to be used in application. Users will not use the products of informatio... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Peer-to-Peer Resource Sharing Scheme Using trusted computing Technology
收藏 引用
Wuhan University Journal of Natural Sciences 2008年 第5期13卷 523-527页
作者: CHEN Lu ZHANG Huanguo ZHANG Liqiang LI Song CAI Liang School of Computer Wuhan University/Key Laboratory ofAerospace Information Security and Trusted Computing of Ministryof Education Wuhan 430072 Hubei China State Key Laboratory of Software Engineering WuhanUniversity Wuhan 430072 Hubei China Department of Information Security Information EngineeringUniversity Zhengzhou 450004 Henan China
Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
EdgeKeeper: a trusted edge computing framework for ubiquitous power Internet of Things
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2021年 第3期22卷 374-399页
作者: Weiyong YANG Wei LIU Xingshen WEI Zixin GUO Kangle YANG Hao HUANG Longyun QI Department of Computer Science and Technology Nanjing UniversityNanjing 210023China NARI Group Co. Ltd.Nanjing 210003China
Ubiquitous power Internet of Things(IoT)is a smart service system oriented to all aspects of the power system,and has the characteristics of universal interconnection,human-computer interaction,comprehensive state per... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Secure Distributed Authentication Scheme Based on CRT-VSS and trusted computing in MANET
收藏 引用
Chinese Journal of Electronics 2014年 第2期23卷 284-290页
作者: WANG Xingfu LU Qiwei XIONG Yan MIAO Fuyou HUANG Wenchao LIU Tao WU Xuangou School of Computer Science and Technology University of Science and Technology of China School of Computer and Information Anhui Polytechic University School of Computer Science Anhui University of Technology
With the rapid development of Mobile ad hoc network(MANET), secure and practical authentication is becoming increasingly important. There still exist several unsolved problems. It may suffer from cheating problems and... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI
收藏 引用
Frontiers of Computer Science 2011年 第2期5卷 169-180页
作者: Lei HAN Jiqiang LIU Zhen HAN Xueye WEI School of Electronics and Information Engineering Beijing Jiaotong University Beijing 100044 China School of Computer and Information Technology Beijing Jiaotong University Beijing 100044 China
In today's globalized digital world, networkbased, mobile, and interactive collaborations have enabled work platforms of personal computers to cross multiple geographical boundaries. The new requirements of privacy-p... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Star-Style Trust Model with the Ability of Data Recovery for trusted computing Platform
收藏 引用
Wuhan University Journal of Natural Sciences 2016年 第2期21卷 115-120页
作者: CHEN Lu ZHANG Huanguo ZHOU Qing ZHANG Liqiang Department of Information Security Naval University of EngineeringWuhan 430033HubeiChina School of Computer Wuhan UniversityWuhan 430072HubeiChina Foundation of Science and Technology on Information Assurance Laboratory Beijing 100072China
Varieties of trusted computing products usually follow the mechanism of liner-style chain of trust according to the specifications of TCG.The distinct advantage is that the compatibility with the existing computing pl... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Development of trusted computing Research
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1407-1413页
作者: ZHANG Huanguo LUO Jie JIN Gang ZHU Zhiqiang YU Fajiang YAN Fei School of Computer Wuhan University Wuhan 430072 Hubei China State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 Hubei China
trusted computing is the new trend of information security today. This paper surveys the theory and technology of trusted computing. The development history of trusted computing, and the development of trusted computi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Static Analysis-Based Behavior Model Building for trusted computing Dynamic Verification
收藏 引用
Wuhan University Journal of Natural Sciences 2010年 第3期15卷 195-200页
作者: YU Fajiang YU Yue School of Computer Wuhan University Wuhan 430072 Hubei China Key Laboratory of Aerospace Information Security and trusted computing of Ministry of Education Wuhan University Wuhan 430072 Hubei China
Current trusted computing platform only verifies application's static Hash value, it could not prevent application from being dynamic attacked. This paper gives one static analysis-based behavior model building metho... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Formal Compatibility Model for trusted computing Applications
收藏 引用
Wuhan University Journal of Natural Sciences 2009年 第5期14卷 388-392页
作者: ZHU Lu YU Sheng ZHANG Xing SHEN Changxiang School of Computer Wuhan University Wuhan 430072 Hubei China Institute of Electronic Technology Information Engineering University Zhengzhou 450004 Henan China trusted computing Laboratory Beijing University of Technology Beijing 100022 China
The Chinese specification for trusted computing, which has similar functions with those defined by the trusted computing Group (TCG), has adopted a different cryptography scheme. Applications designed for the TCG sp... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论