Font Size: a A A
Keyword [trusted computing]
Result: 21 - 40 | Page: 2 of 10
21. Research On Key Technology Of Trusted Authentication
22. The Security Architecture And Practical Model For Important Information System
23. Researching Of Implementation Of High Level Secure Trusted Operationg System
24. Certifying The Safety Of Assembly Pointer Programs
25. Certifying Concurrent Porgrams Using Transactional Memory
26. Mobile Code Security Based On Trusted Computing Technology
27. Research On Credential-Based Trust Management
28. Researches On Non-Interference Trusted Model And The Implementation Of Trusted Computing Platform Architecture
29. Researches On Dynamic Trusted Theories And Models Of Software Behavior
30. Trusted Access In Wireless Networks Theory And Applications
31. Research On Distributed Access Control Based On Trusted Computing
32. Research On The Architecture And Key Technologies Of Trusted Portable Computing Environment
33. Research Of The Access Control Techniques Based On Platform Integrity Attestation
34. On The Verification Of Trusted And Autonomic Service Cooperation Systems
35. Study On Key Security Techniques Of Mobile Communication Network Oriented To Convergence
36. Research On Several Key Issues In Complex Online Reputation System
37. Security Technology Research In Object-based Storage System
38. A Research On Design And Formal Construction Of Trusted Routing Protocols In Mobile Ad-hoc Networks
39. The Research Of Key Techniques And Application Of Trusted Operating System Based On Virtual Machine Technology
40. The Research On Some Theories And Key Technologies Of Hybrid Cloud Computing Security
  <<First  <Prev  Next>  Last>>  Jump to