您当前的位置:
首页 >
文章列表页 >
WLAN Mesh security association scheme in trusted computing environment
paperⅡ | 更新时间:2024-06-05
    • WLAN Mesh security association scheme in trusted computing environment

    • Journal on Communications   Vol. 35, Issue 7, Pages: 94-103(2014)
    • DOI:10.3969/j.issn.1000-436x.2014.07.012    

      CLC: TP393.08
    • Online First:2014-07

      Published:25 July 2014

    移动端阅览

  • Yue-lei XIAO, Yu-min WANG, Liao-jun PANG, et al. WLAN Mesh security association scheme in trusted computing environment[J]. Journal on Communications, 2014, 35(7): 94-103. DOI: 10.3969/j.issn.1000-436x.2014.07.012.

  •  
  •  

0

Views

212

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Rational-security and fair two-party comparison protocol
Survey on trusted cloud platform technology
Label-based protection scheme of vTPM secret
Data integrity verification based on model cloud federation of TPA
New extension method of trusted certificate chain in virtual platform environment

Related Author

Yao ZHU
Yang XIAO
Qingqi PEI
Xiaoguo LI
Ximeng LIU
Bowen ZHAO
Xinfeng HE
Junfeng TIAN

Related Institution

Xidian University State Key Laboratory of Integrated Service Networks
School of Computing and Information Systems, Singapore Management University
College of Computer and Data Science, Fuzhou University
Guangzhou Institute of Technology, Xidian University
Key Lab on High Trusted Information System of Hebei Province
0