介绍可信软件当前的眼界内容,研究挑战等等,是学习的一些参考文献整理的。
2022-10-17 15:25:51 167KB 软件,可信,研究问题
1
在linux平台,利用模拟TPM构建可信平台,在TDD层掉用模拟可信芯片散列算法计算文件散列值。
2022-09-24 22:00:21 2KB tpm 可信
关于可信计算的一些文章,很全的,让你对可信计算有个全面的认识。
2022-09-15 18:45:17 5.64MB 可信计算
1
在基于iBeacon技术的指纹库室内定位算法中,由于室内环境中人员走动、多径效应等因素所带来的噪声影响,需要加以抑制。卡尔曼滤波算法可以用来抑制这些噪声,进而建立可信(即更接近真实值)的指纹库。重点研究在使用卡尔曼滤波算法时,根据具体的室内环境进行测量,估算出不同iBeacon节点的观测噪声以及卡尔曼滤波算法的迭代初值,使卡尔曼滤波算法更快收敛。实验结果表明,通过卡尔曼滤波算法建立的指纹库比通过平均值建立的指纹库,定位精确度和稳定度均有明显的提升。
2022-08-19 15:56:18 1.52MB iBeacon 室内定位 卡尔曼滤波
1
向云端转移,存在诸多原因:现买现付成本模型、可以从任何位置或通过任何设备进行全球访问、根据业务需求变化调整规模、内置的灾难恢复、和为 IT 部门提供更大的灵活性
2022-08-03 18:00:23 1.54MB azure
1
网关客户端登陆软件TBSG2.2.4 可信边界安全网关客户端.exe
2022-07-26 14:01:07 2.59MB 可信边界安全网关客户端.exe
1
华中科技大学网络空间安全学院2019级可信计算实验资料
2022-07-22 13:00:06 70.23MB 华中科技大学 可信计算实验
1
信息安全技术 可信计算规范
2022-07-08 16:00:06 1.54MB 可信计算标准
1
2021 TRUCS可信云大会(公开)资料汇总-共45份.zip
2022-07-06 21:00:10 133.83MB 2021TRUCS可信云大会
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM. What you’ll learn TPM 2.0 architecture fundamentals, including changes from TPM 1.2 TPM 2.0 security concepts Essential application development techniques A deep dive into the features of TPM 2.0 A primer on the execution environments available for application development. Learn as you go! Who this book is for Application software developers, OS developers, device-driver developers, and embedded-device specialists, who will benefit from mastering TPM 2.0 capabilities and building their own applications quickly. This book will give them the tools they need to experiment with and understand the technology. Software architects who need to understand the security guarantees provided by TPMs Managers who fund the projects that use TPMs. Non-technical users who may want to know why TPMs are on their computers and how to make use of them.
2022-07-04 01:54:27 5.34MB TPM 可信计算 Trused Computing
1