Showing 1 - 12 results of 12 for search 'Deng-guo FENG', query time: 0.02s
Refine Results
-
1
Attribute-based authenticated key agreement protocol supporting revocation by Qiang LI, Deng-guo FENG, Li-wu ZHANG
Published 2014-05-01
Article -
2
Power model in power analysis attack by Peng LUO, Deng-guo FENG, Yong-bin ZHOU
Published 2012-09-01
Article -
3
Risk-adaptive access control model for big data in healthcare by Zhen HUI, Hao LI, Min ZHANG, Deng-guo FENG
Published 2015-12-01
Article -
4
Formal modeling and analyzing method for database security policy by Rong WANG, Min ZHANG, Deng-guo FENG, Hao LI
Published 2015-09-01
Article -
5
Research of platform identity attestation based on trusted chip by Qian-ying ZHANG, Deng-guo FENG, Shi-jun ZHAO
Published 2014-08-01
Article -
6
Exploit detection based on illegal control flow transfers identification by Ming-hua WANG, Ling-yun YING, Deng-guo FENG
Published 2014-09-01
Article -
7
Analyzing the trust chain of trusted virtualization platform based on the extended LS<sup>2</sup> by De-xian CHANG, Deng-guo FENG, Yu QIN, Qian-ying ZHANG
Published 2013-05-01
Article -
8
Attack signature generation by traceable dynamic taint analysis by Yu LIU, Mei-ning NIE, Pu-rui SU, Deng-guo FENG
Published 2012-05-01
Article -
9
Design and implementation of secure Windows platform based on TCM by Wei FENG, Yu QIN, Deng-guo FENG, Bo YANG, Ying-jun ZHANG
Published 2015-08-01
Article -
10
Analysis of the success probability of cube attack by Hai-xin SONG, Xiu-bin FAN, Chuan-kun WU, Deng-guo FENG
Published 2012-10-01
Article -
11
Research of a trusted execution environment module for multiple platforms by Qian-ying ZHANG, Shi-jun ZHAO, Wei FENG, Yu QIN, Deng-guo FENG
Published 2014-11-01
Article -
12
Privacy-perserving scheme for social networks by Zhi-quan LV, Cheng HONG, Min1 ZHANG, Deng-guo FENG, Kai-qu CHEN
Published 2014-08-01
Article