Author of the publication

A Watermark-Aware Trusted Running Environment for Software Clouds.

, , , , and . ChinaGrid, page 144-151. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Symbolic Analysis of Programmable Logic Controllers., , , , , and . IEEE Trans. Computers, 63 (10): 2563-2575 (2014)Lightweight security for mobile commerce transactions., , , and . Computer Communications, 26 (18): 2052-2060 (2003)An octree-based proxy for collision detection in large-scale particle systems., , , and . SCIENCE CHINA Information Sciences, 56 (1): 1-10 (2013)Heuristic-Guided Abstraction Refinement., , , and . Comput. J., 52 (3): 280-287 (2009)Overlap-free Karatsuba-Ofman polynomial multiplication algorithms., , , and . IET Information Security, 4 (1): 8-14 (2010)Automatic G1 arc spline interpolation for closed point set., , , and . Computer-Aided Design, 36 (12): 1205-1218 (2004)Gn blending multiple surfaces in polar coordinates., , , and . Computer-Aided Design, 42 (6): 479-494 (2010)Shape control of swept surface with profiles., and . Computer-Aided Design, 33 (12): 893-902 (2001)A Hierachical Method for Wiring and Congestion Prediction., , , , , , and . ISVLSI, page 307-308. IEEE Computer Society, (2005)iDola: Bridge Modeling to Verification and Implementation of Interrupt-Driven Systems., , , , , and . TASE, page 193-200. IEEE Computer Society, (2014)