keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
2017 Vol. 3, No. 4
Published: 13 April 2017

 
290 Building Cyber Security Defense by Trusted Computing 3.0
2017 Vol. 3 (4): 290-298 [Abstract] ( 109 ) HTML (1 KB)  PDF  (1075 KB)  ( 334 )
299 An Overview of Trusted Computing Structure Specification
2017 Vol. 3 (4): 299-304 [Abstract] ( 123 ) HTML (1 KB)  PDF  (4215 KB)  ( 166 )
305 Cryptographic Service Platform Based on Trusted Computing Technology
2017 Vol. 3 (4): 305-309 [Abstract] ( 90 ) HTML (1 KB)  PDF  (3854 KB)  ( 108 )
310 The TPCM Platform Measurement and Control Design
2017 Vol. 3 (4): 310-315 [Abstract] ( 198 ) HTML (1 KB)  PDF  (4044 KB)  ( 118 )
316 Research and Application of Trusted Software Base
2017 Vol. 3 (4): 316-322 [Abstract] ( 189 ) HTML (1 KB)  PDF  (4520 KB)  ( 98 )
323 Research on Key Techniques of Trusted Server Platform in Cloud Environment
2017 Vol. 3 (4): 323-331 [Abstract] ( 64 ) HTML (1 KB)  PDF  (7035 KB)  ( 87 )
332 The Implementation and Application of Trusted Connect Architecture
2017 Vol. 3 (4): 332-338 [Abstract] ( 50 ) HTML (1 KB)  PDF  (5568 KB)  ( 100 )
339 A Data Protection Method Based on Trusted Computing in Distributed Storage
2017 Vol. 3 (4): 339-343 [Abstract] ( 51 ) HTML (1 KB)  PDF  (4230 KB)  ( 112 )
344 Evaluation of Trusted Cloud Services Based on ThirdParty Regulation
2017 Vol. 3 (4): 344-352 [Abstract] ( 57 ) HTML (1 KB)  PDF  (6390 KB)  ( 118 )
353 Research and Application of Trusted Computing in Electric Power System
2017 Vol. 3 (4): 353-358 [Abstract] ( 79 ) HTML (1 KB)  PDF  (5080 KB)  ( 117 )
359 Research on Security Protection Architecture for Television Production and Broadcast Network System Based on Trusted Computing
2017 Vol. 3 (4): 359-363 [Abstract] ( 50 ) HTML (1 KB)  PDF  (10188 KB)  ( 44 )
364 Research of the Application of Trusted Computing in Key Systems of Insurance Industry
2017 Vol. 3 (4): 364-369 [Abstract] ( 52 ) HTML (1 KB)  PDF  (1799 KB)  ( 96 )
370 Application of Safe Independent DecisionMaking and Controllable Product in ICS
2017 Vol. 3 (4): 370-374 [Abstract] ( 67 ) HTML (1 KB)  PDF  (4361 KB)  ( 111 )
375 Construction of Critical Information Infrastructure Protection System Based on?Classifed?Protection?and?Trusted?Computing
2017 Vol. 3 (4): 375-381 [Abstract] ( 36 ) HTML (1 KB)  PDF  (1036 KB)  ( 218 )
382 The Army Trusted Computing Standard of Civil-Military Integration
2017 Vol. 3 (4): 382-384 [Abstract] ( 34 ) HTML (1 KB)  PDF  (685 KB)  ( 110 )
Copyright © Editorial Board of Journal of Information Security Research