Research of network interconnection based on trust evaluation
暂无分享,去创建一个
[1] Yu Wei-hua. Design of trusted authentication-enabled mobile IPSec VPN system , 2013 .
[2] Fan Xiang-yu. Session key agreement scheme for Ad Hoc network based on identity authentication , 2010 .
[3] Wei Dong,et al. Recent advances on trusted computing in China , 2012 .
[4] X Jiang. Design of enhanced memory protection of trusted computing architecture , 2013 .
[5] Ma Jian-feng,et al. Research Status and Development Trends of Access Control Model , 2012 .
[6] Chen Zuo-ning. Policy embedded dynamic integrity active measurement architecture , 2013 .
[7] Shi Guang-yuana. Research and development of trustworthiness attestation in trusted computing , 2011 .