Journal articles on the topic 'Trusted computing platform'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Trusted computing platform.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gengler, Barbara. "Trusted Computing Platform Alliance." Network Security 2001, no. 3 (2001): 6. http://dx.doi.org/10.1016/s1353-4858(01)00312-9.
Full textShen, Ping Ping, Jing Bo Yang, Cai Dong Gu, and Yu Jiang. "A Layered Trusted Computing Platform Module with Unified Deployment on Server." Advanced Materials Research 532-533 (June 2012): 841–45. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.841.
Full textCao, Yan Fei, and Jun Ming Pan. "The Study of Network Information System Security Strategy Based on Trusted Cloud Computing." Applied Mechanics and Materials 571-572 (June 2014): 400–403. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.400.
Full textPirker, Martin, and Ronald Toegl. "Towards a Virtual Trusted Platform." JUCS - Journal of Universal Computer Science 16, no. (4) (2010): 531–42. https://doi.org/10.3217/jucs-016-04-0531.
Full textLu, Hui Hong. "The Implementation of Trusted Computing Based Network Trusted Management Information System." Advanced Materials Research 532-533 (June 2012): 1064–68. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.1064.
Full textZhang, Shuang, Yuanxun Wang, Xinyu Wan, Zhihui Li, and Yangming Guo. "Virtualization Airborne Trusted General Computing Technology." Applied Sciences 13, no. 3 (2023): 1342. http://dx.doi.org/10.3390/app13031342.
Full textZhang, Jinnan, Changqi Lu, Gang Cheng, et al. "A Blockchain-Based Trusted Edge Platform in Edge Computing Environment." Sensors 21, no. 6 (2021): 2126. http://dx.doi.org/10.3390/s21062126.
Full textZhao, Bao Hua, and Hao Guo. "Dynamic Remote Attestation on Trusted Computing." Applied Mechanics and Materials 696 (November 2014): 167–72. http://dx.doi.org/10.4028/www.scientific.net/amm.696.167.
Full textZhang, Wen Bo, Zhen Shan Bao, Jian Li, and Li Juan Duan. "IaaS Architecture Based on Trusted Computing." Applied Mechanics and Materials 513-517 (February 2014): 399–402. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.399.
Full textSandhu, Ravi, Xinwen Zhang, Kumar Ranganathan, and Michael J. Covington. "Client-side access control enforcement using trusted computing and PEI models." Journal of High Speed Networks 15, no. 3 (2006): 229–45. https://doi.org/10.3233/hsn-2006-288.
Full textSi, Zhi Gang, Ying Wan, Yun Shuai Shi, and Ping Li. "Research of Secure Sharing of Electronic Medical Records in Internet." Applied Mechanics and Materials 170-173 (May 2012): 3390–97. http://dx.doi.org/10.4028/www.scientific.net/amm.170-173.3390.
Full textSchmidt, Andreas U., Andreas Leicher, Inhyok Cha, and Yogendra Shah. "Trusted Platform Validation and Management." International Journal of Dependable and Trustworthy Information Systems 1, no. 2 (2010): 1–31. http://dx.doi.org/10.4018/jdtis.2010040101.
Full textHuang, Chenlin, Chuanwang Hou, Huadong Dai, Yan Ding, Songling Fu, and Mengluo Ji. "Research on Linux Trusted Boot Method Based on Reverse Integrity Verification." Scientific Programming 2016 (2016): 1–12. http://dx.doi.org/10.1155/2016/4516596.
Full textDietrich, Kurt. "On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms." JUCS - Journal of Universal Computer Science 16, no. (4) (2010): 507–18. https://doi.org/10.3217/jucs-016-04-0507.
Full textPadma, E. "Trusted Attestation System for Cloud Computing Environment Using Trusted Platform Module." Internet of Things and Cloud Computing 5, no. 3 (2017): 38. http://dx.doi.org/10.11648/j.iotcc.20170503.11.
Full textGupta, Punit, and Deepika Agrawal. "Trusted Cloud Platform for Cloud Infrastructure." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 8 (2013): 1884–91. http://dx.doi.org/10.24297/ijct.v10i8.1473.
Full textYang, Bo Long, and Hao Guo. "Remote Attestation on Trusted Cloud Computing." Applied Mechanics and Materials 696 (November 2014): 161–66. http://dx.doi.org/10.4028/www.scientific.net/amm.696.161.
Full textZhou, Yuting, Bo Zhao, and Yang An. "A Novel Trusted Software Base for Commercial Android Devices Using Secure TF Card." Security and Communication Networks 2022 (February 16, 2022): 1–12. http://dx.doi.org/10.1155/2022/6731277.
Full textHe, Fan. "Applied-Information System in Accounting Data Security via Cloud Computing Systems." Advanced Materials Research 1022 (August 2014): 253–56. http://dx.doi.org/10.4028/www.scientific.net/amr.1022.253.
Full textBorovikov, Aleksey, Oleg Maslov, Stepan Mordvinov, and Andrei Esafiev. "Increasing Hardware-Software Platforms Trust Levels to Prevent Exploiting BIOS Vulnerabilities." Voprosy kiberbezopasnosti, no. 6(46) (2021): 68–77. http://dx.doi.org/10.21681/2311-3456-2021-6-68-77.
Full textNing, Zhen-Hu, Wei Jiang, Jing Zhan, and Peng Liang. "Property-Based Anonymous Attestation in Trusted Cloud Computing." Journal of Electrical and Computer Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/687158.
Full textXiaofei, Wang, Hong Fan, Tang Xueming, and Cui Guohua. "Merkle tree digital signature and trusted computing platform." Wuhan University Journal of Natural Sciences 11, no. 6 (2006): 1467–72. http://dx.doi.org/10.1007/bf02831799.
Full textYou-lei, Chen, and Shen Chang-xiang. "A security kernel architecture based trusted computing platform." Wuhan University Journal of Natural Sciences 10, no. 1 (2005): 1–4. http://dx.doi.org/10.1007/bf02828604.
Full textGhazizadeh, Eghbal, Mazdak Zamani, Jamalul-lail Ab Manan, and Mojtaba Alizadeh. "Trusted Computing Strengthens Cloud Authentication." Scientific World Journal 2014 (2014): 1–17. http://dx.doi.org/10.1155/2014/260187.
Full textXie, Fu, and Yun Yun Du. "Research on Cloud Computing Security Based on the Remote Attestation." Applied Mechanics and Materials 321-324 (June 2013): 2657–64. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2657.
Full textLiu, Maomao, Liping Wu, Xingbo Zhang, and Yan Li. "Safety Management Solution for Health Monitoring User Terminals Based on Trusted Computing." Scientific Programming 2022 (March 2, 2022): 1–10. http://dx.doi.org/10.1155/2022/1485550.
Full textDeng, Yuhui, and Na Helian. "Single Attestation Image for a Trusted and Scalable Grid." International Journal of Grid and High Performance Computing 2, no. 1 (2010): 21–33. http://dx.doi.org/10.4018/jghpc.2010092802.
Full textSanjay, Ram M. Vijayaraj A. "Analysis of the characteristics and trusted security of cloud computing." International Journal on Cloud Computing: Services and Architecture(IJCCSA) 1, November (2018): 01–09. https://doi.org/10.5281/zenodo.1449876.
Full textWu, Jinyu, Wenwei Tao, Yuyang Lai, and Zuming Qin. "Industrial Control Trusted Computing Platform for Power Monitoring System." Journal of Physics: Conference Series 1744, no. 2 (2021): 022114. http://dx.doi.org/10.1088/1742-6596/1744/2/022114.
Full textXU, Ming-Di, Huan-Guo ZHANG, Heng ZHAO, Jun-Lin LI, and Fei YAN. "Security Analysis on Trust Chain of Trusted Computing Platform." Chinese Journal of Computers 33, no. 7 (2010): 1165–76. http://dx.doi.org/10.3724/sp.j.1016.2010.01165.
Full textLUO, Jie. "Research on cryptology mechanism of trusted computing platform module." Journal of Computer Applications 28, no. 8 (2008): 1907–11. http://dx.doi.org/10.3724/sp.j.1087.2008.01907.
Full textXu, Feng, and Hongxu Ma. "Web Service System Structure based on Trusted Computing Platform." Intelligent Automation & Soft Computing 19, no. 2 (2013): 175–84. http://dx.doi.org/10.1080/10798587.2013.787185.
Full textPark, Seung Je, and Heeyoul Kim. "Improving Trusted Cloud Computing Platform with Hybrid Security Protocols." Journal of Korean Institute of Information Technology 13, no. 5 (2015): 65. http://dx.doi.org/10.14801/jkiit.2015.13.5.65.
Full textSONG, Cheng, Wei-ping PENG, Yang XIN, Shou-shan LUO, and Hong-liang ZHU. "Seal-based secure boot scheme for trusted computing platform." Journal of China Universities of Posts and Telecommunications 17 (December 2010): 16–21. http://dx.doi.org/10.1016/s1005-8885(09)60589-6.
Full textKashif, Ubaidullah Alias, Zulfiqar Ali Memon, Shafaq Siddiqui, Abdul Rasheed Balouch, and Rakhi Batra. "Architectural Design of Trusted Platform for IaaS Cloud Computing." International Journal of Cloud Applications and Computing 8, no. 2 (2018): 47–65. http://dx.doi.org/10.4018/ijcac.2018040103.
Full textLiu, Xian’gang, Xing Zhang, Yingfang Fu, and Changxiang Shen. "Remote attestation-based access control on trusted computing platform." Wuhan University Journal of Natural Sciences 15, no. 3 (2010): 190–94. http://dx.doi.org/10.1007/s11859-010-0302-x.
Full textFaisal, Mohammad, Ikram Ali, Muhammad Sajjad Khan, Su Min Kim, and Junsu Kim. "Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges." Complexity 2020 (December 21, 2020): 1–9. http://dx.doi.org/10.1155/2020/6612919.
Full textHu, Yu. "Application of Trusted Virtual Environment Module in Cloud Computing." Advanced Materials Research 616-618 (December 2012): 2196–99. http://dx.doi.org/10.4028/www.scientific.net/amr.616-618.2196.
Full textNing, Zhen-Hu, Chang-Xiang Shen, Yong Zhao, and Peng Liang. "Trusted Measurement Model Based on Multitenant Behaviors." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/384967.
Full textJen-Liang, Cheng, Chen Wei-Yu, Wu Dai-Ye, Chen Kuang-Chi, and Zhang Hong-Wei. "EMULATING TRUSTED PLATFORM MODULE 2.0 ON RASPBERRY PI 2." International Journal of Security, Privacy and Trust Management ( IJSPTM ) 9, no. 3 (2020): 1–11. https://doi.org/10.5281/zenodo.4013110.
Full textEkberg, Jan-Erik. "Mobile Trusted Computing Based on MTM." International Journal of Dependable and Trustworthy Information Systems 1, no. 4 (2010): 25–42. http://dx.doi.org/10.4018/jdtis.2010100102.
Full textYang, Ying, and Xue Hang Shao. "The Research and Design of Trusted Cloud Computing Platform Based on Group Theory." Advanced Materials Research 756-759 (September 2013): 867–71. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.867.
Full textXu, Guobin, Oluwole Adetifa, Jianzhou Mao, Eric Sakk, and Shuangbao Wang. "Developing Quantum Trusted Platform Module (QTPM) to Advance IoT Security." Future Internet 17, no. 5 (2025): 193. https://doi.org/10.3390/fi17050193.
Full textYang, Qing, Hao Wang, Xiaoxiao Wu, Taotao Wang, Shengli Zhang, and Naijin Liu. "Secure Blockchain Platform for Industrial IoT with Trusted Computing Hardware." IEEE Internet of Things Magazine 4, no. 4 (2021): 86–92. http://dx.doi.org/10.1109/iotm.001.2100043.
Full textKIM, H. "Enhancing Trusted Cloud Computing Platform for Infrastructure as a Service." Advances in Electrical and Computer Engineering 17, no. 1 (2017): 9–14. http://dx.doi.org/10.4316/aece.2017.01002.
Full textSun, Haonan, Rongyu He, Yong Zhang, Ruiyun Wang, Wai Hung Ip, and Kai Leung Yung. "eTPM: A Trusted Cloud Platform Enclave TPM Scheme Based on Intel SGX Technology." Sensors 18, no. 11 (2018): 3807. http://dx.doi.org/10.3390/s18113807.
Full textLiu, Zhen Peng, Feng Long Wu, Kai Yu Shang, and Wen Lei Chai. "C-MAS: The Cloud Mutual Authentication Scheme." Advanced Materials Research 756-759 (September 2013): 3209–14. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.3209.
Full textMr. Suresh S, Dr. Manish Varshney. "Openid Authentication Model for Cloud Security Using Trusted Platform." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (2023): 404–12. http://dx.doi.org/10.52783/tjjpt.v44.i4.853.
Full textZhong, Beixin, Zilong Yang, Zhonghao Liu, Xiaoyong Chen, and Shi Cheng. "Trusted Computing and Privacy Protection Method for Computer IoT Nodes Based on Fuzzy Logic Blockchain." Mathematical Problems in Engineering 2022 (August 31, 2022): 1–10. http://dx.doi.org/10.1155/2022/9649862.
Full textHao, Liming, Xun Sun, Shutang Yang, and Songnian Lu. "A method to implement full anonymous attestation for trusted computing platform." Wuhan University Journal of Natural Sciences 12, no. 1 (2007): 101–4. http://dx.doi.org/10.1007/s11859-006-0224-9.
Full text