[1] |
HE Liwen, HOU Xiaoyu, TANG Chengcheng, ZHOU Rui, ZHANG Xingning.
Rootkit Universality Detection Method for Heterogeneous BIOS Environments
[J]. Computer Engineering and Applications, 2019, 55(23): 105-112.
|
[2] |
SUN Haoran1,2, SHI Zhiping1,2,3, GUAN Yong1,3, WANG Rui2,3.
Analysis and formal modeling of puncturing robot’s sports safety
[J]. Computer Engineering and Applications, 2018, 54(18): 263-270.
|
[3] |
WANG Yong1,2, SHANG Wenli2, ZHAO Jianming2, WAN Ming2, YUAN Weiwei1.
Design of embedded trusted computing platform based on TPM
[J]. Computer Engineering and Applications, 2018, 54(13): 105-110.
|
[4] |
MA Liang, QIAN Xuezhong.
Research on critical path of Web service call based on trusted computing
[J]. Computer Engineering and Applications, 2016, 52(3): 230-235.
|
[5] |
LI Qun, CHEN Qingliang.
Formal verification of fair exchange protocols based on Alternating-Time Temporal Logic
[J]. Computer Engineering and Applications, 2015, 51(19): 32-36.
|
[6] |
SHANG Jing, XU Kaiyong, YANG Qichao.
Trusted boot for computer centralized control system-oriented architecture
[J]. Computer Engineering and Applications, 2015, 51(17): 64-69.
|
[7] |
ZHAO Bo1,2, FEI Yongkang1,2, XIANG Shuang1,2, LI Yifan1,2.
Research and implementation of secure boot mechanism for embedded systems
[J]. Computer Engineering and Applications, 2014, 50(10): 72-77.
|
[8] |
CHENG Ge, LI Cong.
Research progress of trusted computing environment
[J]. Computer Engineering and Applications, 2013, 49(13): 59-64.
|
[9] |
DONG Lingling1, GUAN Yong1, LI Xiaojuan1, SHI Zhiping1, ZHANG Jie2, HUA Wei1.
Verification for SpaceWire error detection mechanism by LTL model checking
[J]. Computer Engineering and Applications, 2012, 48(22): 88-94.
|
[10] |
LIU Lan, YUAN Daohua, TONG Xing, WANG Zhonglei.
Distributed trusted verification mechanism for trusted computing platform
[J]. Computer Engineering and Applications, 2012, 48(2): 99-102.
|
[11] |
CHONG Huifang,WU Zhenqiang,WANG Haiyan.
Property-supported self-attestation model and its secure protocol
[J]. Computer Engineering and Applications, 2011, 47(7): 110-113.
|
[12] |
GAI Xinmao1,2,SHEN Changxiang2,3,LI Yong2,4,LIU Yi3.
Method for layering components towards structured protection
[J]. Computer Engineering and Applications, 2011, 47(36): 25-28.
|
[13] |
YANG Bei,WU Zhenqiang,YANG Xiaobo.
Multi-level security model based on trusted computing
[J]. Computer Engineering and Applications, 2011, 47(27): 122-125.
|
[14] |
LI Yong1,LI Guang2,SHEN Changxiang3.
Research of trusted channel model
[J]. Computer Engineering and Applications, 2011, 47(26): 70-73.
|
[15] |
MA Hua1,ZHANG Hongyu2.
Component selection approach combining trust fuzzy evaluation and dynamic clustering
[J]. Computer Engineering and Applications, 2011, 47(21): 73-76.
|