您当前的位置:
首页 >
文章列表页 >
Method of designing security protocol for remote attestation
更新时间:2024-10-14
    • Method of designing security protocol for remote attestation

    • Issue 10, Pages: 19-24(2008)
    • CLC: TP393.08
    • Published:2008

    移动端阅览

  • YU Rong-wei1, WANG Li-na1, KUANG Bo1. Method of designing security protocol for remote attestation[J]. 2008, (10): 19-24. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

870

下载量

1

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Overview of research on trusted attestation technology of cloud virtualization platform
Security-enhanced live migration based on SGX for virtual machine
Remote attestation scheme for cloud platform based on double-layer unbalanced hash tree
Improved direct anonymous attestation scheme for mobile computing platforms
Trusted and anonymous authentication scheme for wireless networks

Related Author

Ruina SUN
Kun ZHANG
Haojun XIA
Bibo TU
Jie CHENG
Yuan SHI
Huan-guo ZHANG
Bo ZHAO

Related Institution

Institute of Information Engineering, Chinese Academy of Sciences
School of Cyber Security, University of Chinese Academy of Sciences
China School of Information Management, Xinjiang University of Finance and Economics
Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Wuhan University
The 3rd Academy,PLA Information Engineering University
0