keywords
Years
Adv Search
33
Home
About Us
Reader
Author
Review
Subscribe
Feedback
中文
About Journal
Editorial Board
Current Issue
Just Accepted
Archive
Read Articles
Download Articles
Online Submission
Manuscript Tracking
Instruction
Download
Peer Review
Editor-in-Chief
Office Work
Announcement
Special Report
Cooperator
Links
2017 Vol. 3, No. 4
Published: 13 April 2017
290
Building Cyber Security Defense by Trusted Computing 3.0
2017 Vol. 3 (4): 290-298 [
Abstract
] (
109
)
HTML
(1 KB)
PDF
(1075 KB) (
334
)
299
An Overview of Trusted Computing Structure Specification
2017 Vol. 3 (4): 299-304 [
Abstract
] (
123
)
HTML
(1 KB)
PDF
(4215 KB) (
166
)
305
Cryptographic Service Platform Based on Trusted Computing Technology
2017 Vol. 3 (4): 305-309 [
Abstract
] (
90
)
HTML
(1 KB)
PDF
(3854 KB) (
108
)
310
The TPCM Platform Measurement and Control Design
2017 Vol. 3 (4): 310-315 [
Abstract
] (
198
)
HTML
(1 KB)
PDF
(4044 KB) (
118
)
316
Research and Application of Trusted Software Base
2017 Vol. 3 (4): 316-322 [
Abstract
] (
189
)
HTML
(1 KB)
PDF
(4520 KB) (
98
)
323
Research on Key Techniques of Trusted Server Platform in Cloud Environment
2017 Vol. 3 (4): 323-331 [
Abstract
] (
64
)
HTML
(1 KB)
PDF
(7035 KB) (
87
)
332
The Implementation and Application of Trusted Connect Architecture
2017 Vol. 3 (4): 332-338 [
Abstract
] (
50
)
HTML
(1 KB)
PDF
(5568 KB) (
100
)
339
A Data Protection Method Based on Trusted Computing in Distributed Storage
2017 Vol. 3 (4): 339-343 [
Abstract
] (
51
)
HTML
(1 KB)
PDF
(4230 KB) (
112
)
344
Evaluation of Trusted Cloud Services Based on ThirdParty Regulation
2017 Vol. 3 (4): 344-352 [
Abstract
] (
57
)
HTML
(1 KB)
PDF
(6390 KB) (
118
)
353
Research and Application of Trusted Computing in Electric Power System
2017 Vol. 3 (4): 353-358 [
Abstract
] (
79
)
HTML
(1 KB)
PDF
(5080 KB) (
117
)
359
Research on Security Protection Architecture for Television Production and Broadcast Network System Based on Trusted Computing
2017 Vol. 3 (4): 359-363 [
Abstract
] (
50
)
HTML
(1 KB)
PDF
(10188 KB) (
44
)
364
Research of the Application of Trusted Computing in Key Systems of Insurance Industry
2017 Vol. 3 (4): 364-369 [
Abstract
] (
52
)
HTML
(1 KB)
PDF
(1799 KB) (
96
)
370
Application of Safe Independent DecisionMaking and Controllable Product in ICS
2017 Vol. 3 (4): 370-374 [
Abstract
] (
67
)
HTML
(1 KB)
PDF
(4361 KB) (
111
)
375
Construction of Critical Information Infrastructure Protection System Based on?Classifed?Protection?and?Trusted?Computing
2017 Vol. 3 (4): 375-381 [
Abstract
] (
36
)
HTML
(1 KB)
PDF
(1036 KB) (
218
)
382
The Army Trusted Computing Standard of Civil-Military Integration
2017 Vol. 3 (4): 382-384 [
Abstract
] (
34
)
HTML
(1 KB)
PDF
(685 KB) (
110
)
Copyright © Editorial Board of Journal of Information Security Research