Author of the publication

Design of U Disk Remote Monitoring System in Trusted Computing Environment.

, , and . IIH-MSP, page 365-368. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lane Boundary Geometry Extraction from Satellite Imagery., , , and . CoRR, (2020)Real-time Face Mask Detection in Video Data., , and . CoRR, (2021)A Provable Secure Mutual RFID Authentication Protocol Based on Error-Correct Code., , , and . CyberC, page 73-78. IEEE Computer Society, (2014)A Homomorphic Masking Defense Scheme Based on RSA Cryptography Algorithm., , , , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 393-402. Springer, (2018)Lane boundary extraction from satellite imagery., , , and . AutonomousGIS@SIGSPATIAL, page 1:1-1:8. ACM, (2017)Accurate vehicle self-localization in high definition map dataset., , , and . AutonomousGIS@SIGSPATIAL, page 2:1-2:8. ACM, (2017)Design of U Disk Remote Monitoring System in Trusted Computing Environment., , and . IIH-MSP, page 365-368. IEEE Computer Society, (2011)Profit Maximization In Arbitrage Loops., , , , , and . ICDCSW, page 153-160. IEEE, (2024)A high-Capacity Watermarking Algorithm Using two Bins Histogram Modification., , , , and . COMPSAC (2), page 382-387. IEEE Computer Society, (2018)978-1-5386-2667-2.A Privacy Set Intersection Algorithm Based on Batch Blind Signatures on Lattice∗., , and . EITCE, page 1828-1832. ACM, (2022)