Recent advances on trusted computing in China

This article highlights some recent research advances on trusted computing in China, focusing mainly on the methodologies and technologies related to trusted computing module, trusted computing platform, trusted network connection, trusted storage, and trustworthy software.

[1]  Jun Yan,et al.  Solving Generalized Optimization Problems Subject to SMT Constraints , 2012, FAW-AAIM.

[2]  Xuanzhe Liu,et al.  A community-centric approach to automated service composition , 2010, Science in China Series F: Information Sciences.

[3]  Yiming Zhang,et al.  Embedded DHT overlays in virtual computing environments , 2010, Science China Information Sciences.

[4]  Ying Tan,et al.  A malware detection model based on a negative selection algorithm with penalty factor , 2010, Science China Information Sciences.

[5]  Yang Liu,et al.  Corslet: A shared storage system keeping your data private , 2011, Science China Information Sciences.

[6]  Dengguo Feng,et al.  A property-based attestation protocol for TCM , 2010, Science China Information Sciences.

[7]  Jianfeng Ma,et al.  Universally composable secure TNC model and EAP-TNC protocol in IF-T , 2010, Science China Information Sciences.

[8]  Xian Zhang,et al.  Runtime Verification with Predictive Semantics , 2012, NASA Formal Methods.

[9]  Yuan Zhou,et al.  Information content security on the Internet: the control model and its evaluation , 2010, Science in China Series F: Information Sciences.

[10]  Yixian Yang,et al.  Secure network coding in the presence of eavesdroppers , 2010, Science China Information Sciences.

[11]  Bo Zhao,et al.  Research on trusted computing and its development , 2010, Science China Information Sciences.

[12]  Ming Tang,et al.  Evolutionary cryptography against multidimensional linear cryptanalysis , 2011, Science China Information Sciences.

[13]  Fengli Yan,et al.  Quantum key distribution using four-level particles , 2010, 1002.1978.

[14]  Yanheng Liu,et al.  A software cascading faults model , 2011, Science China Information Sciences.

[15]  Jianhua Zhao,et al.  Path-Oriented Reachability Verification of a Class of Nonlinear Hybrid Automata Using Convex Programming , 2010, VMCAI.

[16]  Ji Wang,et al.  Linear Absolute Value Relation Analysis , 2011, ESOP.

[17]  Xuejun Yang,et al.  Slicing Execution with Partial Weakest Precondition for Model Abstraction of C Programs , 2010, Comput. J..

[18]  Hong Wen,et al.  A framework of physical layer technique assisted authentication for vehicular communication networks , 2010, Science China Information Sciences.

[19]  Guosun Zeng,et al.  Bayesian cognitive trust model based self-clustering algorithm for MANETs , 2010, Science China Information Sciences.

[20]  Lian Li,et al.  Algorithms for k-fault tolerant power assignments in wireless sensor networks , 2010, Science China Information Sciences.

[21]  Feng Liu,et al.  Formal proof of integer adders using all-prefix-sums operation , 2011, Science China Information Sciences.

[22]  Bo Li,et al.  Reliability-aware automatic composition approach for web services , 2012, Science China Information Sciences.

[23]  Wei Ren,et al.  Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks , 2010, Science China Information Sciences.

[24]  Yuan Feng,et al.  Quantum programming: From theories to implementations , 2012 .

[25]  Wei Li,et al.  A formal semantics for program debugging , 2011, Science China Information Sciences.

[26]  Ji Wang,et al.  Quantitative analysis for symbolic heap bounds of CPS software , 2011, Comput. Sci. Inf. Syst..

[27]  Hao Chen,et al.  A light-weight, secure and trusted virtual execution environment , 2012 .

[28]  Li Li,et al.  Competent predicate abstraction in model checking , 2010, Science China Information Sciences.

[29]  Yang Yang,et al.  Research on theory and key technology of trusted computing platform security testing and evaluation , 2010, Science China Information Sciences.

[30]  Dengguo Feng,et al.  Security model and modular design of fair authentication key exchange protocols , 2010, Science China Information Sciences.

[31]  Ming Tang,et al.  Capability of evolutionary cryptosystems against differential cryptanalysis , 2011, Science China Information Sciences.

[32]  Haiyan Zhao,et al.  Towards a More Fundamental Explanation of Constraints in Feature Models: A Requirement-Oriented Approach , 2011, ICSR.

[33]  Hongyan Liu,et al.  Capability description and discovery of Internetware entity , 2010, Science China Information Sciences.