Author:
Yu Aimin,Feng Dengguo,Liu Ren
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Trustworthy Execution in Untrustworthy Autonomous Systems;2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2023-11-01
2. Reconfigurable TPM Implemented with Ultralow-Power Management in 28nm CMOS Process for IoT SoC Design;Journal of Hardware and Systems Security;2021-01-19
3. Unified Model for Data Security - A Position Paper;2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications;2014-09
4. Research on the encryption and digital signatures in remote attestation from elliptic curve group;Applied Mathematics & Information Sciences;2013-05-01