Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on trusted computing and its development., , , , , , , , and . SCIENCE CHINA Information Sciences, 53 (3): 405-433 (2010)Automated Verification of Noninterference Property., , , , , and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 629-646. Springer, (2018)Research on theory and key technology of trusted computing platform security testing and evaluation., , , , , , and . SCIENCE CHINA Information Sciences, 53 (3): 434-453 (2010)Dynamic Group Behavior Analysis and Its Application in Network Abnormal Behavior Detection., , , , and . ChinaCom (2), volume 237 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 292-301. Springer, (2017)Connectivity Probability Based Spray and Wait Routing Algorithm in Mobile Opportunistic Networks., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1636-1642. IEEE, (2018)Research on Storage Security Based on Trusted Computing Platform., and . ISECS, page 448-452. IEEE Computer Society, (2008)Research and Implement of Secure Bootstrap for Virtual Machine Based on Trusted Computing Platform., , and . DASC, page 514-519. IEEE Computer Society, (2009)Dynamic Proofs of Retrievability for Coded Cloud Storage Systems., , , and . IEEE Trans. Services Computing, 11 (4): 685-698 (2018)Design Secure Contexts Detect Based on Lattice for Grid Computing Environment., , , and . ISECS, page 110-113. IEEE Computer Society, (2008)Research on Secure and Reconfigurable Architecture Based on Embedded Hardware., , and . DASC, page 127-131. IEEE Computer Society, (2009)