• This thesis also presents a method to extend the edge of the control area of the secure OS by adopting trusted computing techniques such as remote attestation and sealed storage.

    最后讨论安全操作系统边界扩展问题,利用可信计算,结合远程证明封装存储相关技术,扩展安全操作系统的控制范围

    youdao

  • This thesis also presents a method to extend the edge of the control area of the secure OS by adopting trusted computing techniques such as remote attestation and sealed storage.

    最后讨论安全操作系统边界扩展问题,利用可信计算,结合远程证明封装存储相关技术,扩展安全操作系统的控制范围

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定