Author of the publication

Research on theory and key technology of trusted computing platform security testing and evaluation.

, , , , , , and . Sci. China Inf. Sci., 53 (3): 434-453 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on trusted computing and its development., , , , , , , , and . Sci. China Inf. Sci., 53 (3): 405-433 (2010)Automated Verification of Noninterference Property., , , , , and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 629-646. Springer, (2018)Research on Secure and Reconfigurable Architecture Based on Embedded Hardware., , and . DASC, page 127-131. IEEE Computer Society, (2009)Connectivity Probability Based Spray and Wait Routing Algorithm in Mobile Opportunistic Networks., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1636-1642. IEEE, (2018)Research on theory and key technology of trusted computing platform security testing and evaluation., , , , , , and . Sci. China Inf. Sci., 53 (3): 434-453 (2010)Dynamic Group Behavior Analysis and Its Application in Network Abnormal Behavior Detection., , , , and . ChinaCom (2), volume 237 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 292-301. Springer, (2017)Research and Implement of Secure Bootstrap for Virtual Machine Based on Trusted Computing Platform., , and . DASC, page 514-519. IEEE Computer Society, (2009)Design Secure Contexts Detect Based on Lattice for Grid Computing Environment., , , and . ISECS, page 110-113. IEEE Computer Society, (2008)