[1] |
HE Liwen, HOU Xiaoyu, TANG Chengcheng, ZHOU Rui, ZHANG Xingning.
Rootkit Universality Detection Method for Heterogeneous BIOS Environments
[J]. Computer Engineering and Applications, 2019, 55(23): 105-112.
|
[2] |
XIAO Meihua, LI Wei, LI Yanan, MEI Yingtian.
Security communication framework of DICOM protocol based on PACS cloud
[J]. Computer Engineering and Applications, 2018, 54(7): 107-113.
|
[3] |
WANG Yong1,2, SHANG Wenli2, ZHAO Jianming2, WAN Ming2, YUAN Weiwei1.
Design of embedded trusted computing platform based on TPM
[J]. Computer Engineering and Applications, 2018, 54(13): 105-110.
|
[4] |
MA Liang, QIAN Xuezhong.
Research on critical path of Web service call based on trusted computing
[J]. Computer Engineering and Applications, 2016, 52(3): 230-235.
|
[5] |
ZHANG Gang, SHI Runhua, ZHONG Hong.
Anonymous authentication scheme based on identity in VANET
[J]. Computer Engineering and Applications, 2016, 52(17): 101-106.
|
[6] |
DENG Fei1, ZHU Ying2.
Mutual password-based client/server authentication protocol
[J]. Computer Engineering and Applications, 2015, 51(20): 72-76.
|
[7] |
SHANG Jing, XU Kaiyong, YANG Qichao.
Trusted boot for computer centralized control system-oriented architecture
[J]. Computer Engineering and Applications, 2015, 51(17): 64-69.
|
[8] |
YU Lei1, WEI Shimin1, ZHUO Zepeng2.
Research on consistence of strand parameters for protocol principals in authentication test theory
[J]. Computer Engineering and Applications, 2015, 51(13): 86-91.
|
[9] |
ZHAO Bo1,2, FEI Yongkang1,2, XIANG Shuang1,2, LI Yifan1,2.
Research and implementation of secure boot mechanism for embedded systems
[J]. Computer Engineering and Applications, 2014, 50(10): 72-77.
|
[10] |
YU Lei, WEI Shimin.
Analysis on properties for principals’ keys on construction of test components
[J]. Computer Engineering and Applications, 2013, 49(6): 114-117.
|
[11] |
CHENG Ge, LI Cong.
Research progress of trusted computing environment
[J]. Computer Engineering and Applications, 2013, 49(13): 59-64.
|
[12] |
LIU Lan, YUAN Daohua, TONG Xing, WANG Zhonglei.
Distributed trusted verification mechanism for trusted computing platform
[J]. Computer Engineering and Applications, 2012, 48(2): 99-102.
|
[13] |
CHONG Huifang,WU Zhenqiang,WANG Haiyan.
Property-supported self-attestation model and its secure protocol
[J]. Computer Engineering and Applications, 2011, 47(7): 110-113.
|
[14] |
GAI Xinmao1,2,SHEN Changxiang2,3,LI Yong2,4,LIU Yi3.
Method for layering components towards structured protection
[J]. Computer Engineering and Applications, 2011, 47(36): 25-28.
|
[15] |
YANG Bei,WU Zhenqiang,YANG Xiaobo.
Multi-level security model based on trusted computing
[J]. Computer Engineering and Applications, 2011, 47(27): 122-125.
|