CORC

浏览/检索结果: 共11条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Electromagnetic radiation based continuous authentication in edge computing enabled internet of things 期刊论文
JOURNAL OF SYSTEMS ARCHITECTURE, 2019, 卷号: 96
作者:  Wang, Jun;  Ni, Mingtao;  Wu, Fusheng;  Liu, Shubo;  Qin, Jun
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/05
SIV: A Structural Integrity Verification Approach of Cloud Components with Enhanced Privacy 期刊论文
TSINGHUA SCIENCE AND TECHNOLOGY, 2019, 卷号: 24, 期号: 5
作者:  Zhao, Bo;  Fan, Peiru;  Zhao, Pengyuan;  Ni, Mingtao;  Liu, Jinhui
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Mchain: A Blockchain-Based VM Measurements Secure Storage Approach in IaaS Cloud With Enhanced Integrity and Controllability 期刊论文
IEEE ACCESS, 2018, 卷号: 6
作者:  Zhao, Bo;  Fan, Peiru;  Ni, Mingtao
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
CREBAD:基于芯片辐射的物联网设备异常检测方案 期刊论文
计算机研究与发展, 2018, 卷号: 55, 期号: 7
作者:  Ni, Mingtao;  Zhao, Bo;  Wu, Fusheng;  Fan, Peiru
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
A novel key agreement protocol based on RET gadget chains for preventing reused code attacks 期刊论文
IEEE Access, 2018, 卷号: 6
作者:  Fusheng, Wu;  Huanguo, Zhang;  Mingtao, Ni;  Jun, Wang;  Zhaoxu, Ji
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/05
Powermitter: Data Exfiltration from Air-Gapped Computer through Switching Power Supply 期刊论文
CHINA COMMUNICATIONS, 2018, 卷号: 15, 期号: 2
作者:  Zhao, Bo;  Ni, Mingtao;  Fan, Peiru
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/05
APM:适用于IaaS平台的agent保护机制 期刊论文
通信学报, 2018, 卷号: 39, 期号: 4
作者:  Fan, Peiru;  Zhao, Bo;  Ni, Mingtao;  Chen, Zhihong
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Electromagnetic radiation based continuous authentication in edge computing enabled internet of things 期刊论文
Journal of Systems Architecture, 2018
作者:  Wang, Jun;  Ni, Mingtao;  Wu, Fusheng;  Liu, Shubo;  Qin, Jun
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Mchain: A blockchain-based vm measurements secure storage approach in iaas cloud with enhanced integrity and controllability 期刊论文
IEEE Access, 2018, 卷号: 6
作者:  Zhao, Bo;  Fan, Peiru;  Ni, Mingtao
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
A Novel Key Agreement Protocol Based on RET Gadget Chains for Preventing Reused Code Attacks 期刊论文
IEEE ACCESS, 2018, 卷号: 6
作者:  Wu Fusheng;  Zhang Huanguo;  Ni Mingtao;  Wang Jun;  Ji Zhaoxu
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05


©版权所有 ©2017 CSpace - Powered by CSpace