Author of the publication

Towards Secure Runtime Customizable Trusted Execution Environment on FPGA-SoC.

, , , , , and . IEEE Trans. Computers, 73 (4): 1138-1151 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Two-Stage PBFT Architecture With Trust and Reward Incentive Mechanism., , , and . IEEE Internet Things J., 10 (13): 11440-11452 (July 2023)BOPE: Boundary Order-Preserving Encryption Scheme in Relational Database System., , , , and . IEEE Access, (2021)Transient performance analysis of smart grid with dynamic power distribution., , and . Inf. Sci., (2018)Towards Secure Runtime Customizable Trusted Execution Environment on FPGA-SoC., , , , , and . IEEE Trans. Computers, 73 (4): 1138-1151 (April 2024)An In-Depth Look at Forking-Based Attacks in Ethereum With PoW Consensus., , , and . IEEE Trans. Netw. Serv. Manag., 21 (1): 507-516 (February 2024)Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-like Blockchains? Quantitative Analysis., , , , , and . CoRR, (2023)Towards interpreting ML-based automated malware detection models: a survey., and . CoRR, (2021)Towards Semi-Markov Model-based Dependability Evaluation of VM-based Multi-Domain Service Function Chain., , , , , and . CoRR, (2023)Deep-Dive Analysis of Selfish and Stubborn Mining in Bitcoin and Ethereum., , , and . CoRR, (2021)PA-iMFL: Communication-Efficient Privacy Amplification Method against Data Reconstruction Attack in Improved Multi-Layer Federated Learning., , , , , and . CoRR, (2023)