Recent advances on trusted computing in China
暂无分享,去创建一个
[1] Jun Yan,et al. Solving Generalized Optimization Problems Subject to SMT Constraints , 2012, FAW-AAIM.
[2] Xuanzhe Liu,et al. A community-centric approach to automated service composition , 2010, Science in China Series F: Information Sciences.
[3] Yiming Zhang,et al. Embedded DHT overlays in virtual computing environments , 2010, Science China Information Sciences.
[4] Ying Tan,et al. A malware detection model based on a negative selection algorithm with penalty factor , 2010, Science China Information Sciences.
[5] Yang Liu,et al. Corslet: A shared storage system keeping your data private , 2011, Science China Information Sciences.
[6] Dengguo Feng,et al. A property-based attestation protocol for TCM , 2010, Science China Information Sciences.
[7] Jianfeng Ma,et al. Universally composable secure TNC model and EAP-TNC protocol in IF-T , 2010, Science China Information Sciences.
[8] Xian Zhang,et al. Runtime Verification with Predictive Semantics , 2012, NASA Formal Methods.
[9] Yuan Zhou,et al. Information content security on the Internet: the control model and its evaluation , 2010, Science in China Series F: Information Sciences.
[10] Yixian Yang,et al. Secure network coding in the presence of eavesdroppers , 2010, Science China Information Sciences.
[11] Bo Zhao,et al. Research on trusted computing and its development , 2010, Science China Information Sciences.
[12] Ming Tang,et al. Evolutionary cryptography against multidimensional linear cryptanalysis , 2011, Science China Information Sciences.
[13] Fengli Yan,et al. Quantum key distribution using four-level particles , 2010, 1002.1978.
[14] Yanheng Liu,et al. A software cascading faults model , 2011, Science China Information Sciences.
[15] Jianhua Zhao,et al. Path-Oriented Reachability Verification of a Class of Nonlinear Hybrid Automata Using Convex Programming , 2010, VMCAI.
[16] Ji Wang,et al. Linear Absolute Value Relation Analysis , 2011, ESOP.
[17] Xuejun Yang,et al. Slicing Execution with Partial Weakest Precondition for Model Abstraction of C Programs , 2010, Comput. J..
[18] Hong Wen,et al. A framework of physical layer technique assisted authentication for vehicular communication networks , 2010, Science China Information Sciences.
[19] Guosun Zeng,et al. Bayesian cognitive trust model based self-clustering algorithm for MANETs , 2010, Science China Information Sciences.
[20] Lian Li,et al. Algorithms for k-fault tolerant power assignments in wireless sensor networks , 2010, Science China Information Sciences.
[21] Feng Liu,et al. Formal proof of integer adders using all-prefix-sums operation , 2011, Science China Information Sciences.
[22] Bo Li,et al. Reliability-aware automatic composition approach for web services , 2012, Science China Information Sciences.
[23] Wei Ren,et al. Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks , 2010, Science China Information Sciences.
[24] Yuan Feng,et al. Quantum programming: From theories to implementations , 2012 .
[25] Wei Li,et al. A formal semantics for program debugging , 2011, Science China Information Sciences.
[26] Ji Wang,et al. Quantitative analysis for symbolic heap bounds of CPS software , 2011, Comput. Sci. Inf. Syst..
[27] Hao Chen,et al. A light-weight, secure and trusted virtual execution environment , 2012 .
[28] Li Li,et al. Competent predicate abstraction in model checking , 2010, Science China Information Sciences.
[29] Yang Yang,et al. Research on theory and key technology of trusted computing platform security testing and evaluation , 2010, Science China Information Sciences.
[30] Dengguo Feng,et al. Security model and modular design of fair authentication key exchange protocols , 2010, Science China Information Sciences.
[31] Ming Tang,et al. Capability of evolutionary cryptosystems against differential cryptanalysis , 2011, Science China Information Sciences.
[32] Haiyan Zhao,et al. Towards a More Fundamental Explanation of Constraints in Feature Models: A Requirement-Oriented Approach , 2011, ICSR.
[33] Hongyan Liu,et al. Capability description and discovery of Internetware entity , 2010, Science China Information Sciences.