Author of the publication

Formal Analysis of Secure Bootstrap in Trusted Computing.

, , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 352-360. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coverage Degree-Coverage Model in Wireless Visual Sensor Networks., , , , , and . IEEE Wirel. Commun. Lett., 8 (3): 817-820 (2019)Formal Analysis of Secure Bootstrap in Trusted Computing., , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 352-360. Springer, (2007)Systems engineering issues for industry applications of large language model., , , , , , , , and . Appl. Soft Comput., (January 2024)Information-centric vehicular social network routing scheme in smart city., , , , and . Internet Technol. Lett., (March 2023)A Determination Algorithm for Probability Density about Uncertain Data Streams Based on GMM., , , and . MSN, page 84-88. IEEE Computer Society, (2013)Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms., , and . ICN, page 65. IEEE Computer Society, (2007)A Certificate-Based Authenticated Key Agreement Protocol for SIP-Based VoIP Networks., , and . NPC Workshops, page 3-10. IEEE Computer Society, (2008)Detecting early worm propagation based on entropy., , and . Infoscale, volume 304 of ACM International Conference Proceeding Series, page 71. ACM, (2007)SPIT Detection and Prevention Method in VoIP Environment., , and . ARES, page 473-478. IEEE Computer Society, (2008)The Four Corners DV-Hop Localization Algorithm for Wireless Sensor Network., , , and . TrustCom, page 1733-1738. IEEE Computer Society, (2011)