Showing 1 - 8 results of 8 for search 'Xingshu Chen', query time: 0.02s
Refine Results
-
1
Label-based protection scheme of vTPM secret by Xingshu CHEN, Wei WANG, Xin JIN
Published 2018-11-01
Article -
2
Access control model for multi-source heterogeneous data in big data environment by Qiuyue SU, Xingshu CHEN, Yonggang LUO
Published 2019-02-01
Article -
3
VMI-based virtual machine remote attestation scheme by Wei WANG, Xingshu CHEN, Xiao LAN, Xin JIN
Published 2018-12-01
Article -
4
Measurement and Analysis of P2P IPTV Program Resource by Wenxian Wang, Xingshu Chen, Haizhou Wang, Qi Zhang, Cheng Wang
Published 2014-01-01
Article -
5
Exploring the talent training mode of“cybersecurity doctor” by Xingshu CHEN, Haizhou WANG, Wenxian WANG, Ping YANG, Shuhua RUAN
Published 2019-06-01
Article -
6
Research on low-rate DDoS attack of SDN network in cloud environment by Xingshu CHEN, Qiang HUA, Yitong WANG, Long GE, Yi ZHU
Published 2019-06-01
Article -
7
Embedding of national cryptographic algorithm in Hyperledger Fabric by Qi CAO, Shuhua RUAN, Xingshu CHEN, Xiao LAN, Hongxia ZHANG, Hongjian JIN
Published 2021-02-01
Article -
8
Blockchain data access control scheme based on CP-ABE algorithm by Yunxiang QIU, Hongxia ZHANG, Qi CAO, Jiancong ZHANG, Xingshu CHEN, Hongjian JIN
Published 2020-06-01
Article