trusted相关论文
Privacy-preservation and effective auditing are two desirable but challenging requirements on distributed ledgers. To me......
It is now the era of big data.Massive volumes of complex and dynamic data exist in a variety of industries,including int......
with the increasing popularity of cloud services,attacks on the cloud infrastructure also increase dramatically.Especial......
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control tec......
As an information acquisition method that can acquire real information,the covert interview has been widely praised and ......
Quantum key distribution (QKD) technology provides proven unconditional point-to-point security based on fundamental qua......
Based on public key, a quantum identity authenticated (QIA) system is proposed without quantum entanglement. The public ......
This paper reviews the development of research on certification of trustworthy digital preservation in the past 20 years......
AkzoNobel’s Industrial Finishes Business Unit - a leading global supplier of cus-tom-formulated industrial finishes,co......
Ashland Distribution,a division of Ashland Inc.(NYSE:ASH),has announced an agreement with Clariant Masterbatch Inc.to m......
文章的开头一般来说应尽量做到开门见山,用简单明白的叙述引出文章的话题,使读者了解文章要谈论什么,一下子引起读者的兴趣。作文......
在早期的基督教徒心目中,鱼被当做救世主的象征。英国是个岛国,海岸线很长,渔业发达。英国人在生活中食用大量的鱼类制品,因此,英......
数据保密在现代网络通讯或电子商务中至关重要。保密(安全)微处理器的诞生,就是为了抵御各种对安全机制的入侵和加速保密运算操作......
夜晚的上海大舞台,荧光棒摇曳成五彩的海洋,点点光亮闪烁着群星般梦幻的美丽。柔和的男声在音乐厅中回荡。他们都已经不再是男孩的......
针对大多数现有技术主要依据可信硬件来保护虚拟机(VM,virtual machine)运行平台的安全,而缺乏对VM安全存储和可信启动保护的问题,......
IN feudal times, imperial exams were the main channel for men of letters to enter officialdom.Unfortunately only men we......
1. What is Spam? The term Spam refers to unsolicited, unwanted. inappropriate bulk email, Usenet postings and MUD/IRC m......
The threshold group signature is an important kind of signature. So far, manythreshold group signature schemes have been......
The paper points out that the deep reason why modern computer system fails to defense malware lies in that user has no r......
Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, s......
On the basis of various firewall-penetrated technologies, a novel firewall-penetrated technology based on trusted host, ......
A new multi-signature scheme was proposed with the extension of the direct anonymous attestation (DAA) protocol supporte......
Two limitations of current integrity measurement ar-chitectures are pointed out: ① a reference value is required for ev......
Distributed architecture is often adopted for the intrusion-tolerance system currently.However,this distributed intrusio......
The scheme introduced by Hwang and Liu in 2008 is shown to be insecure against the key replacement attack. A more practi......
Based on human psychological cognitive behavior,a Comprehensive and Adaptive Trust(CAT) model for largescale P2P network......
Quorum systems have been used to solve the problem of data consistency in distributed fault-tolerance systems. But when ......
In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in diffe......
Current trusted computing platform only verifies application’s static Hash value, it could not prevent application from......
阜阳市局 £4a 局长——_MINtkMMtgj’#lnH$B——q.M——D收束志不他只邀狲位J则【科校为先导推动地租工作.B为广为戳民U用凶盼引眯B.......
阜阳市局 £4a 局长——_MINtkMMtgj’#lnH$B——q.M——D收束志不他只邀狲位J则【科校为先导推动地租工作.B为广为戳民U用凶盼引眯B.......
Along with the rapid development and wide application of information technology, human society has entered the informati......
In this paper, a new cash scheme is proposed for electronic payment system, in which the cash can be transferred several......
A scholar in Guangxi named Sun Zichu was sincere and honest by nature. He was so frank and unreserved that he always tr......
In key escrow field it is important to solve the problem that user’s secret key completely depends on the trusted escro......
This paper considers the key management issue of secure group communication in a highly mobile networking environment. I......
Electronic transaction through e-payment protocol will grow tremendous in the coming years. In this article, by converse......
Security of mobile-agent based network management must be considered due to the widespread adoption of mo-bile agents in......
Security is an important issue for the widespread deployment of applications based on software agent technolo-gy.It is g......
Based on Shamir’s threshold secret sharing scheme and the discrete logarithm problem, a new (t, n) threshold secret sha......
This paper, focusing on the trusted computing group’s standards, explained the key concept of trusted computing and pro......
The security problem of mobile agents is widely being discussed. The problem which protects mobile agents from malicious......
We argue that traditional identity-based systems from pairings seem unsuitable for designing group signature schemes due......
The idea behind a (t, n) threshold blind signature is that a user can ask at least t out of n players of a group to coop......
Safety and security is key aspect for successful application of the mobile computation.We introduce Confined-πcalculus ......
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication.Ne......