您当前的位置:
首页 >
文章列表页 >
Establishing secure boundary of IoT based on trusted computing
更新时间:2026-04-20
    • Establishing secure boundary of IoT based on trusted computing

    • Vol. 32, Issue 12, Pages: 7-11(2019)
    • DOI:10.13992/j.cnki.tetas.2019.12.002    

      CLC: TN915.08;TP391.44
    • Published:2019

    移动端阅览

  • 何申, 黄静, 赵海燕, et al. Establishing secure boundary of IoT based on trusted computing[J]. 2019, 32(12): 7-11. DOI: 10.13992/j.cnki.tetas.2019.12.002.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

176

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Influence of 900 MHz refarming on 2G IoT service capability
Research and application on the native cipher
Research on optimization of multi-user indoor visible light communication system
Method of end-to-end service quality analysis for operators’ internet of things
Research on implementation of blockchain technology in internet of things

Related Author

梁上燕
张斌
耿鲁静
张柠
唐克迪
张弘扬
于乐
李祥军

Related Institution

中国移动通信集团有限公司
中国移动通信集团设计院有限公司
中国移动通信集团公司信息安全管理与运行中心
石家庄铁道大学
河北医科大学第四医院
0