Recent advances on trusted computing in China

W Dong, LQ Chen - Chinese Science Bulletin, 2012 - Springer
This article highlights some recent research advances on trusted computing in China,
focusing mainly on the methodologies and technologies related to trusted computing …

Research on trusted computing and its development

CX Shen, HG Zhang, HM Wang, J Wang… - Science China …, 2010 - Springer
Trusted computing is a novel technology of information system security. It has become a new
tide in worldwide information security area and achieved inspiring accomplishment. In …

Development of trusted computing research

Z Huanguo, L Jie, J Gang, Z Zhiqiang… - … University Journal of …, 2006 - Springer
Trusted computing is the new trend of information security today. This paper surveys the
theory and technology of trusted computing. The development history of trusted computing …

Survey on key technology development and application in trusted computing

J Wang, Y Shi, G Peng, H Zhang, B Zhao… - China …, 2016 - ieeexplore.ieee.org
Trusted computing, which can effectively increase the credibility of information system, has
made great achievements and is in continuous development. For country who is going to …

The theory and practice in the evolution of trusted computing

D Feng, Y Qin, W Feng, J Shao - Chinese science bulletin, 2014 - Springer
Trusted computing (TC) is an emerging technology to enhance the security of various
computing platforms by a dedicated secure chip (TPM/TCM), which is widely accepted by …

The mechanism about key and credential on trusted computing platform and the application study

Z Zhidong, Z Huanguo, Z Miao, Y Fei… - Wuhan University Journal …, 2006 - Springer
Trusted Computing technology is quickly developing in recent years. This technology
manages to improve the computer security and archive a trusted computing environment …

High time for trusted computing

B Potter - IEEE Security & Privacy, 2009 - ieeexplore.ieee.org
Trusted computing is an idea worth dusting off. Although it has been a bit of a flop for the
better part of a half century, we might be experiencing a perfect storm regarding the …

Concepts of trusted computing

G Proudler - Trusted computing, 2005 - books.google.com
Maintaining a sufficient level of security is a challenge that businesses and society face as
they increase their reliance on IT infrastructures. Increasing numbers of threats, less time to …

[图书][B] Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers

M Yung, L Zhu, Y Yang - 2016 - books.google.com
These proceedings contains 27 papers presented at the INTRUST (International Conference
on Trustworthy Systems) 2014 conference, held in Beijing, China, in December 2014 …

[引用][C] Recent advances on trusted computing in China

D Wei, C LiQian - Chinese Science Bulletin, 2012 - SCIENCE PRESS 16 …