Author of the publication

Theory and methodology of research on cloud security.

, , and . SCIENCE CHINA Information Sciences, 59 (5): 050105:1-050105:3 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Theory and methodology of research on cloud security., , and . SCIENCE CHINA Information Sciences, 59 (5): 050105:1-050105:3 (2016)A privacy-preserving location tracking system for smartphones based on cloud storage., , , , and . Security and Communication Networks, 8 (3): 446-458 (2015)Secure cryptographic functions via virtualization-based outsourced computing., , , and . Concurrency and Computation: Practice and Experience, 28 (11): 3149-3163 (2016)Accelerating Smith-Waterman Alignment of Species-Based Protein Sequences on GPU., , , , and . International Journal of Parallel Programming, 43 (3): 359-380 (2015)TEE: A virtual DRTM based execution environment for secure cloud-end computing., , , , , , and . Future Generation Comp. Syst., (2015)SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone., , , , , and . IEEE Access, (2018)Libsec: A Hardware Virtualization-Based Isolation for Shared Library., , , , , and . HPCC/SmartCity/DSS, page 34-41. IEEE Computer Society, (2017)TEE: a virtual DRTM based execution environment for secure cloud-end computing., , , , , and . ACM Conference on Computer and Communications Security, page 663-665. ACM, (2010)ONHelp: Components in Building Secure Cloud Based on OpenNebula., , , and . TrustCom, page 320-327. IEEE Computer Society, (2014)Enhancing Data Trustworthiness via Assured Digital Signing., , , and . IEEE Trans. Dependable Sec. Comput., 9 (6): 838-851 (2012)