您当前的位置:
首页 >
文章列表页 >
Analyzing the trust chain of trusted virtualization platform based on the extended LS2
academic paper | 更新时间:2024-06-05
    • Analyzing the trust chain of trusted virtualization platform based on the extended LS2

    • Journal on Communications   Vol. 34, Issue 5, Pages: 31-41(2013)
    • DOI:10.3969/j.issn.1000-436x.2013.05.004    

      CLC: TP309
    • Online First:2013-05

      Published:25 May 2013

    移动端阅览

  • De-xian CHANG, Deng-guo FENG, Yu QIN, et al. Analyzing the trust chain of trusted virtualization platform based on the extended LS2[J]. Journal on Communications, 2013, 34(5): 31-41. DOI: 10.3969/j.issn.1000-436x.2013.05.004.

  •  
  •  

0

Views

566

下载量

8

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Trust chain generating and updating algorithm for dual redundancy system
Rational-security and fair two-party comparison protocol
Survey on trusted cloud platform technology
Label-based protection scheme of vTPM secret
Data integrity verification based on model cloud federation of TPA

Related Author

Lei WANG
Ming-hua YANG
Zeng-liang LIU
Jian-qun ZHENG
Yao ZHU
Bowen ZHAO
Ximeng LIU
Xiaoguo LI

Related Institution

Rocket Force Equipment Research Institute
Institute of Information Operation,National Defence University of PLA
Department of Precision Instrument,Tsinghua University
Xidian University State Key Laboratory of Integrated Service Networks
School of Computing and Information Systems, Singapore Management University
0