2012
DOI: 10.1007/s11434-012-5550-z
|View full text |Cite
|
Sign up to set email alerts
|

Recent advances on trusted computing in China

Abstract: This article highlights some recent research advances on trusted computing in China, focusing mainly on the methodologies and technologies related to trusted computing module, trusted computing platform, trusted network connection, trusted storage, and trustworthy software. Trusted computing leads an emerging trend in information technology towards improving the trustworthiness and security of computer systems. It has attracted great worldwide attention from both academia and industry in recent years.In partic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2014
2014
2025
2025

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 34 publications
0
0
0
Order By: Relevance
“…To address this issue, the Trusted Network Connection Group (TCG) formulated a Trusted Network Connection (TNC) architecture that utilizes trusted computing technology. Many researchers have conducted studies on TNC protocols based on the TNC architecture [40][41][42][43][44][45][46] . The TNC architecture essentially requires the integrity of the terminal device, on the basis of traditional network access authentication, platform identity authentication, and platform integrity verification are added.…”
Section: Trusted Connection Protocolmentioning
confidence: 99%
“…To address this issue, the Trusted Network Connection Group (TCG) formulated a Trusted Network Connection (TNC) architecture that utilizes trusted computing technology. Many researchers have conducted studies on TNC protocols based on the TNC architecture [40][41][42][43][44][45][46] . The TNC architecture essentially requires the integrity of the terminal device, on the basis of traditional network access authentication, platform identity authentication, and platform integrity verification are added.…”
Section: Trusted Connection Protocolmentioning
confidence: 99%