Author of the publication

Application-Assisted Dynamic Attestation for JVM-Based Cloud.

, , , , , and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 691-700. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User-policy-based dynamic remote attestation in cloud computing., , , , , and . IJES, 8 (1): 39-45 (2016)Trust-Enhanced Alteration Scenario for Universal Computer., , and . PRDC, page 275-280. IEEE Computer Society, (2005)Cryptanalysis of Remote Data Integrity Checking Protocol Proposed by L. Chen for Cloud Storage., , , and . IEICE Transactions, 97-A (1): 418-420 (2014)OBC Based Optimization of Re-encryption for Cryptographic Cloud Storage., , , , , and . ICA3PP, volume 10048 of Lecture Notes in Computer Science, page 586-595. Springer, (2016)Practical, Provably Secure, and Black-Box Traceable CP-ABE for Cryptographic Cloud Storage., , , , , and . Symmetry, 10 (10): 482 (2018)A Novel Vertical Fragmentation Method for Privacy Protection Based on Entropy Minimization in a Relational Database., , , and . Symmetry, 10 (11): 637 (2018)Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing., , , , and . Future Generation Comp. Syst., (2018)Trusted Bytecode Virtual Machine Module: A Novel Method for Dynamic Remote Attestation in Cloud Computing., , , , , and . Int. J. Comput. Intell. Syst., 5 (5): 924-932 (2012)Attributes Union in CP-ABE Algorithm for Large Universe Cryptographic Access Control., , , , and . CGC, page 180-186. IEEE Computer Society, (2012)A semantic web service composition dynamic detecting method., , , , , and . ICDIM, page 326-330. IEEE, (2012)