咨询与建议

限定检索结果

文献类型

  • 81 篇 会议
  • 57 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 139 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 132 篇 工学
    • 107 篇 计算机科学与技术...
    • 54 篇 电气工程
    • 30 篇 软件工程
    • 27 篇 信息与通信工程
    • 10 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 8 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 4 篇 石油与天然气工程
    • 2 篇 交通运输工程
    • 1 篇 机械工程
    • 1 篇 土木工程
    • 1 篇 安全科学与工程
  • 13 篇 理学
    • 7 篇 数学
    • 7 篇 化学
    • 5 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 139 篇 trusted platform...
  • 29 篇 trusted computin...
  • 15 篇 security
  • 11 篇 remote attestati...
  • 10 篇 internet of thin...
  • 10 篇 cloud computing
  • 9 篇 direct anonymous...
  • 8 篇 wireless sensor ...
  • 8 篇 tpm
  • 7 篇 authentication
  • 7 篇 security in iot
  • 7 篇 cryptography
  • 6 篇 data integrity
  • 6 篇 trusted executio...
  • 5 篇 data security
  • 5 篇 trusted computin...
  • 5 篇 embedded systems
  • 5 篇 mobile trusted m...
  • 5 篇 blockchain
  • 5 篇 trust

机构

  • 5 篇 mil univ technol...
  • 3 篇 nanyang technol ...
  • 3 篇 xidian univ sch ...
  • 3 篇 fraunhofer inst ...
  • 2 篇 xidian univ sch ...
  • 2 篇 univ grenoble al...
  • 2 篇 iowa state univ ...
  • 2 篇 beijing jiaotong...
  • 2 篇 school of inform...
  • 2 篇 univ grenoble al...
  • 2 篇 fraunhofer iosb ...
  • 2 篇 eut tirana alban...
  • 2 篇 graz univ techno...
  • 2 篇 network & educat...
  • 2 篇 gifu univ gifu 3
  • 2 篇 national enginee...
  • 2 篇 infineon technol...
  • 2 篇 put tirana alban...
  • 2 篇 nanjing univ sci...
  • 2 篇 iowa state univ ...

作者

  • 9 篇 furtak janusz
  • 7 篇 chudzikiewicz ja...
  • 6 篇 zielinski zbigni...
  • 5 篇 chen liqun
  • 3 篇 ma jianfeng
  • 3 篇 kim jeongnyeo
  • 3 篇 castillo encarna...
  • 3 篇 escobar-molero a...
  • 3 篇 kim daewon
  • 3 篇 urian rainer
  • 3 篇 morales diego p.
  • 3 篇 akram raja naeem
  • 3 篇 goh weihan
  • 3 篇 yeo chai kiat
  • 3 篇 wagner steffen
  • 3 篇 parrilla luis
  • 3 篇 dong xuewen
  • 3 篇 lu di
  • 2 篇 schellekens drie...
  • 2 篇 kadry sara

语言

  • 137 篇 英文
  • 2 篇 其他
检索条件"主题词=Trusted Platform Module"
139 条 记 录,以下是41-50 订阅
排序:
A Unified Trust Model for Pervasive Environments - Simulation and Analysis
收藏 引用
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 2013年 第7期7卷 1569-1584页
作者: Khiabani, Hamed Idris, Norbik Bashah Ab Manan, Jamalul-lail Univ Technol Malaysia Adv Informat Sch Kuala Lumpur Malaysia MIMOS Berhad Strateg Adv Res Cluster Kuala Lumpur Malaysia
Ubiquitous interaction in a pervasive environment is the main attribute of smart spaces. Pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unob... 详细信息
来源: 评论
Efficient ID-based TPM key loading scheme for trusted platform
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2010年 第4期17卷 74-79页
作者: SONG Cheng LIU Bing HU Zheng-ming XIN Yang YANG Yi-xian YIN Han Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China Beijing Safe-Code Technology Co. Ltd Beijing 100876 China Huawei Technology Ltd Beijing 100093 China
One important function in trusted computing is protected storage, which can protect unlimited amount of data and keys. In the existing trusted platform module (TPM) key loading scheme for trusted platform, a computi... 详细信息
来源: 评论
Trust Ensuring Crisis Management Hardware module
收藏 引用
INFORMATION SECURITY JOURNAL 2010年 第2期19卷 74-83页
作者: Fournaris, Apostolos P. Hitachi Europe SAS Informat & Commun Technol Lab European RD Ctr Sofia Antipolis France
Mobile agent systems (MAS) suffer from security holes that in a crisisdisaster management system can be fatal. trusted computing group's TPM chip can be used to solve the problem but only partially. The extreme ph... 详细信息
来源: 评论
Implementing trusted Terminals with a TPM and SITDRM
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2008年 第1期197卷 73-85页
作者: Stamm, Sid Sheppard, Nicholas Paul Safavi-Naini, Reihaneh Indiana Univ Dept Comp Sci Lindley Hall150 S Woodlawn Ave Bloomington IN 47405 USA Univ Wollongong Sch Comp Sci & Software Engn Wollongong NSW 2522 Australia Univ Calgary Dept Comp Sci Calgary AB T2N 1N4 Canada
The SITDRM Enterprise system [1] protects private customer data by allowing customers to provide policies in the form of a machine-readable license. When employees of an organization want to use customers' data, t... 详细信息
来源: 评论
High Time for trusted Computing
收藏 引用
IEEE SECURITY & PRIVACY 2009年 第6期7卷 54-56页
作者: Potter, Bruce The Shmoo Group Abstract Authors References Cited By Keywords Metrics Similar Download Citation Email Print Request Permissions
trusted computing is an idea worth dusting off. Although it has been a bit of a flop for the better part of a half century, we might be experiencing a perfect storm regarding the motivations and capabilities needed to... 详细信息
来源: 评论
Security and privacy landscape in emerging technologies
收藏 引用
IEEE SECURITY & PRIVACY 2008年 第4期6卷 74-77页
作者: Landau, Susan Sun Microsyst. Santa Clara CA Abstract Authors References Cited By Keywords Metrics Similar Download Citation Email Print Request Permissions
Recent events spawned a need for better communications of security systems, including industrial control systems and emergency management systems. This work is in initial phases and the author reports it here. In this... 详细信息
来源: 评论
Formal analysis of HMAC authorisation in the TPM2.0 specification
收藏 引用
IET INFORMATION SECURITY 2018年 第2期12卷 133-140页
作者: Shao, Jianxiong Qin, Yu Feng, Dengguo Chinese Acad Sci Inst Software Trusted Comp & Informat Assurance Lab Beijing Peoples R China
The trusted platform module (TPM) is a system component that provides a hardware-based approach to establish trust in a platform. The latest TPM2.0 specification was accepted as the ISO standard in 2015. It offers fun... 详细信息
来源: 评论
trusted computing in context
收藏 引用
IEEE SECURITY & PRIVACY 2007年 第2期5卷 4-5页
作者: Schneider, Fred B. Associate Editor in Chief
The trusted computing technology embodied in the trusted platform module secure-coprocessor from the trusted Computing Group is a hardware-based root of trust that makes it possible for the system designer--not the co... 详细信息
来源: 评论
Guest editorial - Special issue on hardware assisted techniques for IoT and bigdata applications
收藏 引用
INTEGRATION-THE VLSI JOURNAL 2017年 58卷 263-266页
作者: Mohanty, Saraju P. Srivastava, Ashok Hu, Shiyan Ghosal, Prasun Univ North Texas Dept Comp Sci & Engn CSE Denton TX 76203 USA Louisiana State Univ Dept Elect & Comp Engn Baton Rouge LA 70803 USA Michigan Technol Univ Houghton MI 49931 USA IIEST Sibpur India
来源: 评论
Anonymous authentication scheme of trusted mobile terminal under mobile Internet
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2013年 第1期20卷 58-65页
作者: ZHANG De-dong MA Zhao-feng NIU Xin-xin Peng Yong Information Security Center Beijing University of Posts and Telecommunications National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications China Information Technology Security Evaluation Center
In order to solve the contradictions between user privacy protection and identity authentication, an anonymous authentication scheme under mobile Internet is proposed, which is based on the direct anonymous attestatio... 详细信息
来源: 评论