Author of the publication

A Method for Realizing Secure Chip Multi-Algorithm Processing Application.

, , , , and . FSDM, volume 309 of Frontiers in Artificial Intelligence and Applications, page 743-748. IOS Press, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method for Exchanging Data Between Master Station and Terminal Based on Key Agreement Mechanism., , , , , , , , , and 1 other author(s). CECNet, volume 363 of Frontiers in Artificial Intelligence and Applications, page 32-39. IOS Press, (2022)Research on a Security Chip Power-Down Test Method Based on MP300 Device., , , , , , , , , and 1 other author(s). FSDM, volume 320 of Frontiers in Artificial Intelligence and Applications, page 870-875. IOS Press, (2019)A New Secure Chip File Access Method Based on Security Level Information., , , , and . FSDM, volume 309 of Frontiers in Artificial Intelligence and Applications, page 749-756. IOS Press, (2018)Prediction of High Frequency Trading Financial Data Using Stacked LSTMs for Algorithmic Trading., , and . FSDM, volume 320 of Frontiers in Artificial Intelligence and Applications, page 1064-1070. IOS Press, (2019)An Implementation of a Chip Security Mechanism., , , and . FSDM, volume 309 of Frontiers in Artificial Intelligence and Applications, page 763-770. IOS Press, (2018)A Method for Realizing Secure Chip Multi-Algorithm Processing Application., , , , and . FSDM, volume 309 of Frontiers in Artificial Intelligence and Applications, page 743-748. IOS Press, (2018)Technology Research on the Application of High Safety Anti-Metal RFID Tags in the Asset Management of Power Equipment., , , and . AIAM (IEEE), page 185-188. IEEE, (2019)A Master Station and Terminal Data Exchange Method Based on Symmetric and Asymmetric Algorithms., , , , , , , , , and . CECNet, volume 345 of Frontiers in Artificial Intelligence and Applications, page 387-393. IOS Press, (2021)