-
1
-
-
78649464677
-
Study on trusted mobile computing and its attestation scheme
-
Xing L, Zhu Y F, Wang M Q. Study on trusted mobile computing and its attestation scheme[J]. Computer Engineering and Design, 2008, 29(3): 1080-1082, 1085.
-
(2008)
Computer Engineering and Design
, vol.29
, Issue.3
-
-
Xing, L.1
Zhu, Y.F.2
Wang, M.Q.3
-
2
-
-
21644486314
-
TCG specification architecture overview (Version 1.2)
-
Trusted Computing Group.
-
Trusted Computing Group. TCG specification architecture overview (Version 1.2)[EB/OL]. https://www.Trustedcomputinggroup.org/. 2007.
-
(2007)
-
-
-
3
-
-
50549090759
-
TCG mobile trusted module specification version 1.0
-
Trusted Computing Group.
-
Trusted Computing Group. TCG mobile trusted module specification version 1.0 [EB/OL]. https://www.trustedcomputinggroup.org. 2007.
-
(2007)
-
-
-
4
-
-
51649129937
-
TCG mobile reference architecture version 1.0
-
Trusted Computing Group.
-
Trusted Computing Group. TCG mobile reference architecture version 1.0 [EB/OL]. https://www.trustedcomputinggroup.org. 2007.
-
(2007)
-
-
-
5
-
-
85040567886
-
Trusted mobile platform hardware architecture description
-
TMP.
-
TMP. Trusted mobile platform hardware architecture description[EB/OL]. http://www.trustedmobile.org/.
-
-
-
-
6
-
-
33749482809
-
Trusted computing based user authentication for mobile equipment
-
Zhen Y, He D K, He M X. Trusted computing based user authentication for mobile equipment[J]. Chinese Journal of Computers, 2006, 29(8): 1255-1264.
-
(2006)
Chinese Journal of Computers
, vol.29
, Issue.8
, pp. 1255-1264
-
-
Zhen, Y.1
He, D.K.2
He, M.X.3
-
7
-
-
50549098992
-
Conceptual design of trusted mobile platform
-
Chen S Y, Wen Y Y, Zhao H. Conceptual design of trusted mobile platform[J]. Journal of Northeastern University (Natural Science), 2008, 29(8): 1096-1099.
-
(2008)
Journal of Northeastern University (Natural Science)
, vol.29
, Issue.8
, pp. 1096-1099
-
-
Chen, S.Y.1
Wen, Y.Y.2
Zhao, H.3
-
8
-
-
78649458201
-
Access model spanning identifier domain based on trusted mobile platform
-
Li J, He Y Z, Shen C X, et al. Access model spanning identifier domain based on trusted mobile platform[J]. Application Research of Computers, 2009, 26(1): 321-324.
-
(2009)
Application Research of Computers
, vol.26
, Issue.1
, pp. 321-324
-
-
Li, J.1
He, Y.Z.2
Shen, C.X.3
-
9
-
-
78649455437
-
Identity management framework based on trusted mobile platform
-
Li J, He Y Z, Shen C X, et al. Identity management framework based on trusted mobile platform[J]. Application Research of Computers, 2009, 26(12): 3711-3714.
-
(2009)
Application Research of Computers
, vol.26
, Issue.12
, pp. 3711-3714
-
-
Li, J.1
He, Y.Z.2
Shen, C.X.3
-
10
-
-
78649480895
-
Research on routing theory and key technologies in mobile internet
-
Beijing: Beijing Jiaotong University
-
Su W. Research on Routing Theory and Key Technologies in Mobile Internet[D]. Beijing: Beijing Jiaotong University, 2008.
-
(2008)
-
-
Su, W.1
-
11
-
-
70349237263
-
Peer-to-peer key technologies in mobile internet
-
Li W, Xu Z Q, Yang Z. Peer-to-peer key technologies in mobile internet[J]. Journal of Software, 2009,20(8): 2199-2213.
-
(2009)
Journal of Software
, vol.20
, Issue.8
, pp. 2199-2213
-
-
Li, W.1
Xu, Z.Q.2
Yang, Z.3
-
12
-
-
78149372097
-
An improved directed anonymous attestation scheme
-
Li J, Wu Z Q, Yu L, et al. An improved directed anonymous attestation scheme[J]. Journal of Computer Applications, 2009, 29 (2): 364-366, 397.
-
(2009)
Journal of Computer Applications
, vol.29
, Issue.2
-
-
Li, J.1
Wu, Z.Q.2
Yu, L.3
-
13
-
-
36249019387
-
Universally composable secure authentication protocol for wireless mesh networks
-
Yang C, Cao C J, Ma J F. Universally composable secure authentication protocol for wireless mesh networks[J]. Journal of Xidian University, 2007, 34(5): 814-817.
-
(2007)
Journal of Xidian University
, vol.34
, Issue.5
, pp. 814-817
-
-
Yang, C.1
Cao, C.J.2
Ma, J.F.3
-
14
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser S, Micali S, Rivest R. A digital signature scheme secure against adaptive chosen-message attacks[J]. SIAM Journal on Computing, 1998, 17(2): 281-308.
-
(1998)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
15
-
-
67650563872
-
An authentication protocol for station roaming in WLAN mesh
-
Cao C J, Yang C, Ma J F. An authentication protocol for station roaming in WLAN mesh[J]. Journal of Computer Research and Development, 2009, 46(7): 1102-1108.
-
(2009)
Journal of Computer Research and Development
, vol.46
, Issue.7
, pp. 1102-1108
-
-
Cao, C.J.1
Yang, C.2
Ma, J.F.3
|