Author of the publication

Implementation of a TCG-Based Trusted Computing in Mobile Device.

, , , , and . TrustBus, volume 5185 of Lecture Notes in Computer Science, page 18-27. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Learning-Based Drug Repositioning of Novel Janus Kinase 2 Inhibitors Utilizing Molecular Docking and Molecular Dynamic Simulation., , , , , , , and . J. Chem. Inf. Model., 63 (21): 6487-6500 (November 2023)Design of an efficient image protection method based on QR code., , and . ICTC, page 1448-1450. IEEE, (2020)A lightweight authentication mechanism between IoT devices., and . ICTC, page 1153-1155. IEEE, (2017)Implementation of a TCG-Based Trusted Computing in Mobile Device., , , , and . TrustBus, volume 5185 of Lecture Notes in Computer Science, page 18-27. Springer, (2008)A Secret Key Updating Method between Devices for Secure Smart Services., and . ICTC, page 946-948. IEEE, (2018)Improvement on TCG Attestation and Its Implication for DRM., , and . ICCSA (1), volume 4705 of Lecture Notes in Computer Science, page 912-925. Springer, (2007)Design and requirements for video encryption in intelligent surveillance system., , and . ICTC, page 763-764. IEEE, (2014)Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card., , , , and . ICDCS Workshops, page 272-278. IEEE Computer Society, (2002)Security considerations for secure and trustworthy smart home system in the IoT environment., , and . ICTC, page 1116-1118. IEEE, (2015)Global Navigation Satellite System Signal Generation Method for Wide Area Protection Against Numerous Unintentional Drones., , , , and . IEEE Access, (2021)