Author of the publication

Research on theory and key technology of trusted computing platform security testing and evaluation.

, , , , , , and . SCIENCE CHINA Information Sciences, 53 (3): 434-453 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of affinely equivalent Boolean functions., , , and . Science in China Series F: Information Sciences, 50 (3): 299-306 (2007)Extended multivariate public key cryptosystems with secure encryption function., , , and . SCIENCE CHINA Information Sciences, 54 (6): 1161-1171 (2011)Research on trusted computing and its development., , , , , , , , and . SCIENCE CHINA Information Sciences, 53 (3): 405-433 (2010)Survey of information security., , , , and . Science in China Series F: Information Sciences, 50 (3): 273-298 (2007)Efficient Modular Exponentiation with Three-Moduli (2n 1, 2n+3)., , and . SNPD (3), page 927-931. IEEE Computer Society, (2007)Research and Implementation of Evolution Cipher Chip., , , , and . ISCID (1), page 32-35. IEEE Computer Society, (2009)The Practical Detailed Requirements of Accountability and Its Application in the Electronic Payment Protocols., , and . EEE, page 556-561. IEEE Computer Society, (2005)A novel algorithm enumerating bent functions., , , and . Discrete Mathematics, 308 (23): 5576-5584 (2008)CHAOS: an SDN-based Moving Target Defense System., , , , , and . CoRR, (2017)A Novel Key Agreement Protocol Based on RET Gadget Chains for Preventing Reused Code Attacks., , , , and . IEEE Access, (2018)