关注
Yu Qin
Yu Qin
Institute of Software, Chinese Academy of Science
在 iscas.ac.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS
W Feng, Y Qin, S Zhao, D Feng
Computer Networks 134, 167-182, 2018
1042018
Providing root of trust for ARM TrustZone using on-chip SRAM
S Zhao, Q Zhang, G Hu, Y Qin, D Feng
Proceedings of the 4th International Workshop on Trustworthy Embedded …, 2014
1032014
Sectee: A software-based approach to secure enclave architecture using tee
S Zhao, Q Zhang, Y Qin, W Feng, D Feng
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
842019
Formal analysis of enhanced authorization in the TPM 2.0
J Shao, Y Qin, D Feng, W Wang
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
342015
DAA-TZ: an efficient DAA scheme for mobile devices using ARM TrustZone
B Yang, K Yang, Y Qin, Z Zhang, D Feng
Trust and Trustworthy Computing: 8th International Conference, TRUST 2015 …, 2015
332015
TMSUI: A trust management scheme of USB storage devices for industrial control systems
B Yang, Y Qin, Y Zhang, W Wang, D Feng
Information and Communications Security: 17th International Conference …, 2016
262016
TEEM: A user-oriented trusted mobile device for multi-platform security applications
W Feng, D Feng, G Wei, Y Qin, Q Zhang, D Chang
Trust and Trustworthy Computing: 6th International Conference, TRUST 2013 …, 2013
242013
Minimal kernel: an operating system architecture for {TEE} to resist board level physical attacks
S Zhao, Q Zhang, Y Qin, W Feng, D Feng
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
222019
Trusttokenf: A generic security framework for mobile two-factor authentication using trustzone
Y Zhang, S Zhao, Y Qin, B Yang, D Feng
2015 IEEE Trustcom/BigDataSE/ISPA 1, 41-48, 2015
202015
Security analysis of SM2 key exchange protocol in TPM2. 0
S Zhao, L Xi, Q Zhang, Y Qin, D Feng
Security and Communication Networks 8 (3), 383-395, 2015
202015
TSD: a flexible root of trust for the cloud
D Chang, X Chu, Y Qin, D Feng
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
192012
A lightweight anonymous mobile shopping scheme based on DAA for trusted mobile platform
B Yang, D Feng, Y Qin
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
162014
The theory and practice in the evolution of trusted computing
D Feng, Y Qin, W Feng, J Shao
Chinese science bulletin 59, 4173-4189, 2014
142014
Type-based analysis of protected storage in the TPM
J Shao, D Feng, Y Qin
Information and Communications Security: 15th International Conference …, 2013
132013
Secure code updates for smart embedded devices based on PUFs
W Feng, Y Qin, S Zhao, Z Liu, X Chu, D Feng
Cryptology and Network Security: 16th International Conference, CANS 2017 …, 2018
122018
AEP-M: Practical anonymous E-payment for mobile devices using ARM trustzone and divisible E-cash
B Yang, K Yang, Z Zhang, Y Qin, D Feng
Information Security: 19th International Conference, ISC 2016, Honolulu, HI …, 2016
122016
Formal analysis of TPM2. 0 key management APIs
Q Zhang, S Zhao, Y Qin, D Feng
Chinese science bulletin 59, 4210-4224, 2014
102014
Automated proof for authorization protocols of TPM 2.0 in computational model
W Wang, Y Qin, D Feng
Information Security Practice and Experience: 10th International Conference …, 2014
92014
Direct anonymous attestation in practice: Implementation and efficient revocation
L Xi, D Feng, Y Qin, F Wei, J Shao, B Yang
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
82014
Formal analysis of HMAC authorisation in the TPM2. 0 specification
J Shao, Y Qin, D Feng
IET Information Security 12 (2), 133-140, 2018
72018
系统目前无法执行此操作,请稍后再试。
文章 1–20