A Chaotic Maps-Based Authentication Scheme for Wireless Body Area Networks
Gao, Gaimei, Peng, Xinguang, Tian, Ye, Qin, Zefeng
Published in International journal of distributed sensor networks (01.07.2016)
Published in International journal of distributed sensor networks (01.07.2016)
Get full text
Journal Article
Research on Data Leak Protection Technology Based on Trusted Platform
Xingkui, Wang, Xinguang, Peng
Published in The Open automation and control systems journal (31.12.2014)
Published in The Open automation and control systems journal (31.12.2014)
Get full text
Journal Article
An Efficient User’s Attribute Revocation Scheme Suitable for Data Outsourcing in Cloud Storage
Zheng, Fang, Peng, Xinguang, Li, Zhidan
Published in Wireless communications and mobile computing (15.02.2022)
Published in Wireless communications and mobile computing (15.02.2022)
Get full text
Journal Article
A novel active contour model for image segmentation using local and global region-based information
Zhang, Ling, Peng, Xinguang, Li, Gang, Li, Haifang
Published in Machine vision and applications (01.02.2017)
Published in Machine vision and applications (01.02.2017)
Get full text
Journal Article
Trust-Based Scheduling Strategy for Workflow Applications in Cloud Environment
Yuli Yang, Xinguang Peng
Published in 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (01.10.2013)
Published in 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (01.10.2013)
Get full text
Conference Proceeding
Research on data leak protection technology based on TPM
Wang Xingkui, Peng Xinguang
Published in Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC) (01.12.2013)
Published in Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC) (01.12.2013)
Get full text
Conference Proceeding
Trust-Based Scheduling Strategy for Cloud Workflow Applications
Yang, Yuli, Peng, Xinguang, Cao, Jianfang
Published in Informatica (Vilnius, Lithuania) (01.01.2015)
Published in Informatica (Vilnius, Lithuania) (01.01.2015)
Get full text
Journal Article
Unbalanced tree‐formed verification data for trusted platforms
Fu, Donglai, Peng, Xinguang, Yang, Yuli
Published in Security and communication networks (10.05.2016)
Published in Security and communication networks (10.05.2016)
Get full text
Journal Article
Anomaly detection of privileged program based on fuzzy segments
Peng Xinguang, Zhang Zhirong, Wang Zheng
Published in Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005 (2005)
Published in Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005 (2005)
Get full text
Conference Proceeding
The trusted computing environment construction based on JTSS
Wang Xingkui, Peng Xinguang
Published in 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC) (01.08.2011)
Published in 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC) (01.08.2011)
Get full text
Conference Proceeding
Filter-based trusted remote attestation for web services
Peng Xinguang, Jia Wei
Published in 2010 3rd International Conference on Computer Science and Information Technology (01.07.2010)
Published in 2010 3rd International Conference on Computer Science and Information Technology (01.07.2010)
Get full text
Conference Proceeding
Trusted remote attestation scheme based on property
Chi Wentao, Peng Xinguang
Published in 2010 International Conference on Computer Application and System Modeling (ICCASM 2010) (01.10.2010)
Published in 2010 International Conference on Computer Application and System Modeling (ICCASM 2010) (01.10.2010)
Get full text
Conference Proceeding
Research of Software Trusted Dynamic Measurement Based on Support Vector Machine
Rui Hao, Xinguang Peng, Lei Xiu
Published in 2012 International Conference on Computing, Measurement, Control and Sensor Network (01.07.2012)
Published in 2012 International Conference on Computing, Measurement, Control and Sensor Network (01.07.2012)
Get full text
Conference Proceeding