Trust Ensuring Crisis Management Hardware Module
暂无分享,去创建一个
[1] Adrian Perrig,et al. Turtles all the way down: research challenges in user-based attestation , 2007, WRAITS '08.
[2] Peter Braun,et al. Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit , 2004 .
[3] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[4] Stefan Kraxberger,et al. An autonomous attestation token to secure mobile agents in disaster response , 2009, Secur. Commun. Networks.
[5] Xiaoping Wu,et al. A Trusted Computing Technology Enabled Mobile Agent System , 2008, 2008 International Conference on Computer Science and Software Engineering.
[6] David M. Chess,et al. Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.
[7] Scott A. Rotondo. Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.
[8] Levente Buttyán,et al. On the Problem of Trust in Mobile Agent Systems , 1998, NDSS.
[9] Xiaoping Wu,et al. Secure Key Management of Mobile Agent System Using TPM-Based Technology on Trusted Computing Platform , 2008, 2008 International Conference on Computer Science and Software Engineering.
[10] Hidema Tanaka,et al. Evaluation of Information Leakage via Electromagnetic Emanation and Effectiveness of Tempest , 2008, IEICE Trans. Inf. Syst..
[11] Levente Buttyán,et al. Introducing Trusted Third Parties to the Mobile Agent Paradigm , 2001, Secure Internet Programming.
[12] Luc Moreau,et al. Trust Relationships in a Mobile Agent System , 2001, Mobile Agents.