[1] |
HE Liwen, HOU Xiaoyu, TANG Chengcheng, ZHOU Rui, ZHANG Xingning.
Rootkit Universality Detection Method for Heterogeneous BIOS Environments
[J]. Computer Engineering and Applications, 2019, 55(23): 105-112.
|
[2] |
WANG Yong1,2, SHANG Wenli2, ZHAO Jianming2, WAN Ming2, YUAN Weiwei1.
Design of embedded trusted computing platform based on TPM
[J]. Computer Engineering and Applications, 2018, 54(13): 105-110.
|
[3] |
HU Ruhui, ZHANG Qirong.
Reasearch of TPM key store management based on identity
[J]. Computer Engineering and Applications, 2017, 53(13): 125-128.
|
[4] |
MA Liang, QIAN Xuezhong.
Research on critical path of Web service call based on trusted computing
[J]. Computer Engineering and Applications, 2016, 52(3): 230-235.
|
[5] |
SHANG Jing, XU Kaiyong, YANG Qichao.
Trusted boot for computer centralized control system-oriented architecture
[J]. Computer Engineering and Applications, 2015, 51(17): 64-69.
|
[6] |
ZHAO Bo1,2, FEI Yongkang1,2, XIANG Shuang1,2, LI Yifan1,2.
Research and implementation of secure boot mechanism for embedded systems
[J]. Computer Engineering and Applications, 2014, 50(10): 72-77.
|
[7] |
CHENG Ge, LI Cong.
Research progress of trusted computing environment
[J]. Computer Engineering and Applications, 2013, 49(13): 59-64.
|
[8] |
LIU Lan, YUAN Daohua, TONG Xing, WANG Zhonglei.
Distributed trusted verification mechanism for trusted computing platform
[J]. Computer Engineering and Applications, 2012, 48(2): 99-102.
|
[9] |
CHONG Huifang,WU Zhenqiang,WANG Haiyan.
Property-supported self-attestation model and its secure protocol
[J]. Computer Engineering and Applications, 2011, 47(7): 110-113.
|
[10] |
GAI Xinmao1,2,SHEN Changxiang2,3,LI Yong2,4,LIU Yi3.
Method for layering components towards structured protection
[J]. Computer Engineering and Applications, 2011, 47(36): 25-28.
|
[11] |
YANG Bei,WU Zhenqiang,YANG Xiaobo.
Multi-level security model based on trusted computing
[J]. Computer Engineering and Applications, 2011, 47(27): 122-125.
|
[12] |
LI Yong1,LI Guang2,SHEN Changxiang3.
Research of trusted channel model
[J]. Computer Engineering and Applications, 2011, 47(26): 70-73.
|
[13] |
MA Hua1,ZHANG Hongyu2.
Component selection approach combining trust fuzzy evaluation and dynamic clustering
[J]. Computer Engineering and Applications, 2011, 47(21): 73-76.
|
[14] |
CHEN Nan,ZHU Jianming .
Analysis and design of trusted online banking authentication protocol
[J]. Computer Engineering and Applications, 2011, 47(12): 65-68.
|
[15] |
LI Jie,WU Zhen-qiang,YU Lu,SUN Peng.
Design of enhanced wireless trusted network accessing attestation model and its protocols
[J]. Computer Engineering and Applications, 2010, 46(7): 121-124.
|