CSCW system access control based on trusted computing;
基于可信计算的CSCW系统访问控制
A sharing model for trusted computing platform;
基于网格环境的可信计算平台共享模型
Research on cryptology mechanism of trusted computing platform module;
可信计算平台模块密码机制研究
The testing method using calculation command to realize calculation signal control was proposed based on the external command control model provided by MTS 793.
10软件提供的外部命令控制模块,提出了一种利用计算命令实现计算信号控制的试验方法。
The current research and problems of the trusted computation;
可信计算的研究及存在的问题
Research on How to Measure Trusted Computation Enabled Linux’s Critical Objects;
近几年可信计算方面的研究发展迅速,但在支持可信计算的Linux方面的研究却相对落后,无法对所有可能改变系统可信状态的关键组件进行完整性验证,以至于无法判断系统是否处于可信状态。
The improvement of communication algorithm was also provided,which reduced the communicat.
针对电力系统分层分区的特点,对算法实现过程中的通信耗时进行了建模,提出了改进的通信算法,减少了算法的通信耗时,提高了并行效率,并且证明该通信算法具有很好的可扩展性。
Trust management of network service based on trust computing platform;
网络服务中基于可信计算平台的信任管理
The Research and Implementation of Secure Embedded System Client Based on Trust Computing Technology;
基于可信计算技术的嵌入式安全终端的研究与实现
At first,the authors analyze the problems of dynamic characteristic,concurrency and consistency for Multiple Remote Attestation Instance(Multi-RAI) in trust computing environment,and propose a complete dynamic update attestation scheme for Multi-RAI in trust computing environment,which guarantees the trustworthiness of endpoints′ computing environment.
首先分析了可信计算环境下多远程证明实例执行的动态性、并发性、一致性等问题,提出了一个完整的可信计算环境多远程证明实例动态更新证明方案,以保证通信双方终端计算环境的可信。
Design Secure Architecture to Defend Computer Based on Trusted Computing
基于可信计算的计算机安全防护体系设计
Peer-to-Peer Anonymous Communication Network Based on Trusted Computing
基于可信计算的P2P匿名通信系统
Application and Research of the Trusted Measurement Mechanism on Trusted Computing Platform;
可信计算平台可信度量机制的应用与研究
The Research of the Trusted Computing System Based on the Lenovo s Security Chip;
基于“恒智”芯片的可信计算系统的研究
Trusted Computing And Its Illumination to Security Of Ad Hoc Network;
可信计算及其对Ad Hoc网络安全的启发
Response Method for TOCTOU Attack in Trusted Computing Platform
可信计算平台中TOCTOU攻击的响应方法
Authentication scheme based on trusted computing of preventing phishing attacks
基于可信计算的防网络欺诈认证方案
Implementation of Direct Anonymous Attestation Scheme Based on Trusted Platform Module
一种可信计算环境下DAA协议实现方案
Study of Remote Automated Anonymous Attestation in Trusted Computing
可信计算中远程自动匿名证明的研究
Novel VPN Authentication Scheme Based on Trusted Computing
一种基于可信计算的VPN接入认证方案
Improvement Scheme on AIK Generation in Trusted Computing
可信计算中AIK密钥生成改进方案
New Anonymous Authentication Scheme for Trusted Computing Platform
一种新的可信计算平台匿名认证方案
The Canetti-Krawczyk Model Under the Trusted Computation
可信计算环境下的Canetti-Krawczyk模型
Testing on Trust Chain of Trusted Computing Platform Based on Labeled Transition System
基于标记变迁系统的可信计算平台信任链测试
Metric and Method of Trust Measurement in Trust Chain of Trusted Comupting Platform;
可信计算平台中信任链的可信赖性度量指标与方法研究
Authenticate as computer when computer information is available
当计算机信息可用时身份验证为计算机
Reliable reputation computing based on double-layer reputation and feedback mechanism
基于双层信誉和反馈机制的可信信誉计算
Client computers can trust the following certificate stores:
客户端计算机可以信任下列证书存储: