SDATA: Symmetrical Device Identifier Composition Engine Complied Aggregate Trust Attestation.
Symmetry, March, 2024
Exploring the Intersection of Lattice Attacks and Blockchain Technology: A Heuristic Approach Using TPM2.0 ECDSA to Ascertain and Approach the Boundary.
Symmetry, March, 2023
FUSION: Measuring Binary Function Similarity with Code-Specific Embedding and Order-Sensitive GNN.
Symmetry, 2022
Hybridchain: A Novel Architecture for Confidentiality-Preserving and Performant Permissioned Blockchain Using Trusted Execution Environment.
IEEE Access, 2020
Detecting and Mitigating Target Link-Flooding Attacks Using SDN.
IEEE Trans. Dependable Secur. Comput., 2019
An efficient anonymous remote attestation scheme for trusted computing based on improved CPK.
Electron. Commer. Res., 2019
A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario.
Secur. Commun. Networks, 2016
A multi-objective optimization model based on immune algorithm in wireless mesh networks.
Int. J. Commun. Syst., 2016
Virtual TPM Dynamic Trust Extension Suitable for Frequent Migrations.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
POSTER: An E2E Trusted Cloud Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
A Vulnerability Attack Graph Generation Method Based on Scripts.
Proceedings of the Information Computing and Applications - Third International Conference, 2012
Similar vulnerability query based on text mining.
Proceedings of the 11th International Symposium on Communications and Information Technologies, 2011
Hierarchical-CPK-Based Trusted Computing Cryptography Scheme.
Proceedings of the Autonomic and Trusted Computing - 8th International Conference, 2011
Research on trusted computing and its development.
Sci. China Inf. Sci., 2010
An Improved Global Trust Value Computing Method in P2P System.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006