Showing 1 - 10 results of 10 for search 'Deng-guo FENG', query time: 0.02s
Refine Results
-
1
Risk-adaptive access control model for big data in healthcare by Zhen HUI, Hao LI, Min ZHANG, Deng-guo FENG
Published 2015-12-01Get full text
Article -
2
Risk-adaptive access control model for big data in healthcare by Zhen HUI, Hao LI, Min ZHANG, Deng-guo FENG
Published 2015-12-01Get full text
Article -
3
Research of platform identity attestation based on trusted chip by Qian-ying ZHANG, Deng-guo FENG, Shi-jun ZHAO
Published 2014-08-01Get full text
Article -
4
Research of platform identity attestation based on trusted chip by Qian-ying ZHANG, Deng-guo FENG, Shi-jun ZHAO
Published 2014-08-01Get full text
Article -
5
Exploit detection based on illegal control flow transfers identification by Ming-hua WANG, Ling-yun YING, Deng-guo FENG
Published 2014-09-01Get full text
Article -
6
Attack signature generation by traceable dynamic taint analysis by Yu LIU, Mei-ning NIE, Pu-rui SU, Deng-guo FENG
Published 2012-05-01Get full text
Article -
7
Analysis of the success probability of cube attack by Hai-xin SONG, Xiu-bin FAN, Chuan-kun WU, Deng-guo FENG
Published 2012-10-01Get full text
Article -
8
Research of a trusted execution environment module for multiple platforms by Qian-ying ZHANG, Shi-jun ZHAO, Wei FENG, Yu QIN, Deng-guo FENG
Published 2014-11-01Get full text
Article -
9
Privacy-perserving scheme for social networks by Zhi-quan LV, Cheng HONG, Min1 ZHANG, Deng-guo FENG, Kai-qu CHEN
Published 2014-08-01Get full text
Article -
10
Privacy-perserving scheme for social networks by Zhi-quan LV, Cheng HONG, Min1 ZHANG, Deng-guo FENG, Kai-qu CHEN
Published 2014-08-01Get full text
Article