Search results for: Liqun Chen
Lecture Notes in Computer Science > Trust and Trustworthy Computing > Technical Strand—Full Papers > 166-180
Lecture Notes in Computer Science > Trusted Computing - Challenges and Applications > TRUST 2008 > 166-178
Lecture Notes in Computer Science > Information Security and Cryptology > Hardware Security > 350-365
Lecture Notes in Computer Science > Trusted Computing - Challenges and Applications > TRUST 2008 > 179-190
Science of Computer Programming > 2015 > 111 > P2 > 300-317
IEEE Journal on Selected Areas in Communications > 2011 > 29 > 3 > 605 - 615
Information Processing Letters > 2010 > 110 > 12-13 > 485-488
International Journal of Information Security > 2009 > 8 > 5 > 315-330