Ronald Toegl, Thomas Winkler, Mohammad Nauman and Theodore W.Hong, "Specification and Standardization of a Java Trusted ComputingAPI SOFTWARE ? PRACTICE AND EXPERIENCE ,2011 View Artical
Yau, Stephen S, "High Performance Computing and Communications ,2011 View Artical
Zhidong Shen, Qiang Tong, "The Security of Cloud Computing System enabled by Trusted Computing Technology ,2010 View Artical
Stueble C, Zaerin A. ?TSS, "A simplified trusted software stack View Artical
C. Latze, U. Ultes-Nitsche, F. Baumgartner, "Extensible Authentication Protocol Method for Trusted Computing Groups (TCG) Trusted Platform Module ,2009 View Artical
Pirker M, Toegl R, Hein D, Danner P, "A Privacy CAfor anonymity and trust ,2009 View Artical
CHEN Xiaofeng and FENG Dengguo, "Direct Anonymous Attestation for Next Generation", TPM JOURNAL OF COMPUTERS ,Vol.3 ,2008 View Artical
Tian Haibo, Wang Yumin, "The Future Network Security", China Communications ,2006 View Artical
Ernest F. Brickell, Jan Camenisch Liqun Chen:, "Direct anonymous attestation. ACM Conference on Computer and Communications Security ,2004 View Artical
E.Padma, Dr.S.Rajalakshmi, "The Privacy Feature of Trusted Computing Technology using the Concept of Direct Anonymous Attestatio", International Journal of Computer Engineering and ,Vol.5 ,2014 View Artical
E.Padma, Dr.S.Rajalakshmi, "An Effective Approach for Trusted Attestation Key in Distributed Computing Environment using TPM", International Journal of Applied Engineering Resea ,2014 View Artical
Marwan Ibrahim Alshar?e, Rossilawati Sulaiman, Mohd Rosmadi Mukhtar and Abdullah Mohd Zin, "A User Protection Model for the Trusted Computing Environment", Journal of Computer Science ,2014 View Artical
Klenk, A., H. Kinkelin, C. Eunicke and G. Carle, "Preventing identity theft with electronic identity cards and the trusted platform module", Proceedings of the 2nd European Workshop on System View Artical
Zhidong Shen, Qiang Tong, "The Security of Cloud Computing System enabled by Trusted Computing Technology ,2010 View Artical
Stueble C, Zaerin A. ?TSS, "A simplified trusted software stack View Artical
Ernest F. Brickell, Jan Camenisch Liqun Chen:, "Direct anonymous attestation. ACM Conference on Computer and Communications Security ,2004 View Artical
E.Padma, Dr.S.Rajalakshmi, "The Privacy Feature of Trusted Computing Technology using the Concept of Direct Anonymous Attestatio", International Journal of Computer Engineering and ,Vol.5 ,2014 View Artical
E.Padma, Dr.S.Rajalakshmi, "An Effective Approach for Trusted Attestation Key in Distributed Computing Environment using TPM", International Journal of Applied Engineering Resea ,2014 View Artical