Author of the publication

CloudSEC: A Cloud Architecture for Composing Collaborative Security Services.

, , , , and . CloudCom, page 703-711. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DWT-Domain Blind Watermark Detection Based on Weak Signal Detection Theory., , and . Journal of Computer Research and Development, 43 (11): 1920-1926 (2006)Black-box testing based on colorful taint analysis., , , and . SCIENCE CHINA Information Sciences, 55 (1): 171-183 (2012)Cryptanalysis on AW digital signature scheme based on error-correcting codes., , and . Science in China Series F: Information Sciences, 45 (5): 397-400 (2002)On the provable security of TPM2.0 cryptography APIs., and . IJES, 7 (3/4): 230-243 (2015)Generic Constructions for Strong Designated Verifier Signature., , and . JIPS, 7 (1): 159-172 (2011)Study on Strand Space Model Theory., , , and . J. Comput. Sci. Technol., 18 (5): 553-570 (2003)Distributed Oblivious Function Evaluation and Its Applications., , , and . J. Comput. Sci. Technol., 19 (6): 942-947 (2004)Computing Walsh coefficients from the algebraic normal form of a Boolean function., , , and . Cryptography and Communications, 6 (4): 335-358 (2014)Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round., and . IET Information Security, 4 (3): 167-184 (2010)Video Steganalysis Exploiting Motion Vector Reversion-Based Features., , and . IEEE Signal Process. Lett., 19 (1): 35-38 (2012)