Author of the publication

Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI.

, , , and . Frontiers Comput. Sci. China, 5 (2): 169-180 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey., , , , , and . IEEE CAA J. Autom. Sinica, 10 (8): 1647-1667 (2023)Polynomial-based modifiable blockchain structure for removing fraud transactions., , , , , and . Future Gener. Comput. Syst., (2019)Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 4099-4112 (2022)Alexa Skills: Security Vulnerabilities and Countermeasures., , , , and . CNS, page 1-9. IEEE, (2022)An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method., , , , , , , and . Wirel. Commun. Mob. Comput., (2020)Random Forest Algorithm Based on Linear Privacy Budget Allocation., , , , and . J. Database Manag., 33 (2): 1-19 (2022)AppQ: Warm-starting App Recommendation Based on View Graphs., , , , , and . CoRR, (2021)Intrusion Prediction with System-call Sequence-to-Sequence Model., , , and . CoRR, (2018)Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts., , , and . ICC, page 1835-1839. IEEE, (2008)Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI., , , and . Frontiers Comput. Sci. China, 5 (2): 169-180 (2011)