keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
2017 Vol. 3, No. 4
Published: 13 April 2017

 
290 Building Cyber Security Defense by Trusted Computing 3.0
2017 Vol. 3 (4): 290-298 [Abstract] ( 88 ) HTML (1 KB)  PDF  (1075 KB)  ( 297 )
299 An Overview of Trusted Computing Structure Specification
2017 Vol. 3 (4): 299-304 [Abstract] ( 102 ) HTML (1 KB)  PDF  (4215 KB)  ( 153 )
305 Cryptographic Service Platform Based on Trusted Computing Technology
2017 Vol. 3 (4): 305-309 [Abstract] ( 71 ) HTML (1 KB)  PDF  (3854 KB)  ( 92 )
310 The TPCM Platform Measurement and Control Design
2017 Vol. 3 (4): 310-315 [Abstract] ( 170 ) HTML (1 KB)  PDF  (4044 KB)  ( 104 )
316 Research and Application of Trusted Software Base
2017 Vol. 3 (4): 316-322 [Abstract] ( 165 ) HTML (1 KB)  PDF  (4520 KB)  ( 82 )
323 Research on Key Techniques of Trusted Server Platform in Cloud Environment
2017 Vol. 3 (4): 323-331 [Abstract] ( 54 ) HTML (1 KB)  PDF  (7035 KB)  ( 80 )
332 The Implementation and Application of Trusted Connect Architecture
2017 Vol. 3 (4): 332-338 [Abstract] ( 41 ) HTML (1 KB)  PDF  (5568 KB)  ( 88 )
339 A Data Protection Method Based on Trusted Computing in Distributed Storage
2017 Vol. 3 (4): 339-343 [Abstract] ( 36 ) HTML (1 KB)  PDF  (4230 KB)  ( 101 )
344 Evaluation of Trusted Cloud Services Based on ThirdParty Regulation
2017 Vol. 3 (4): 344-352 [Abstract] ( 46 ) HTML (1 KB)  PDF  (6390 KB)  ( 102 )
353 Research and Application of Trusted Computing in Electric Power System
2017 Vol. 3 (4): 353-358 [Abstract] ( 59 ) HTML (1 KB)  PDF  (5080 KB)  ( 106 )
359 Research on Security Protection Architecture for Television Production and Broadcast Network System Based on Trusted Computing
2017 Vol. 3 (4): 359-363 [Abstract] ( 41 ) HTML (1 KB)  PDF  (10188 KB)  ( 41 )
364 Research of the Application of Trusted Computing in Key Systems of Insurance Industry
2017 Vol. 3 (4): 364-369 [Abstract] ( 39 ) HTML (1 KB)  PDF  (1799 KB)  ( 82 )
370 Application of Safe Independent DecisionMaking and Controllable Product in ICS
2017 Vol. 3 (4): 370-374 [Abstract] ( 50 ) HTML (1 KB)  PDF  (4361 KB)  ( 99 )
375 Construction of Critical Information Infrastructure Protection System Based on?Classifed?Protection?and?Trusted?Computing
2017 Vol. 3 (4): 375-381 [Abstract] ( 27 ) HTML (1 KB)  PDF  (1036 KB)  ( 183 )
382 The Army Trusted Computing Standard of Civil-Military Integration
2017 Vol. 3 (4): 382-384 [Abstract] ( 25 ) HTML (1 KB)  PDF  (685 KB)  ( 96 )
Copyright © Editorial Board of Journal of Information Security Research