AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS W Feng, Y Qin, S Zhao, D Feng Computer Networks 134, 167-182, 2018 | 104 | 2018 |
Providing root of trust for ARM TrustZone using on-chip SRAM S Zhao, Q Zhang, G Hu, Y Qin, D Feng Proceedings of the 4th International Workshop on Trustworthy Embedded …, 2014 | 103 | 2014 |
Sectee: A software-based approach to secure enclave architecture using tee S Zhao, Q Zhang, Y Qin, W Feng, D Feng Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 84 | 2019 |
Formal analysis of enhanced authorization in the TPM 2.0 J Shao, Y Qin, D Feng, W Wang Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 34 | 2015 |
DAA-TZ: an efficient DAA scheme for mobile devices using ARM TrustZone B Yang, K Yang, Y Qin, Z Zhang, D Feng Trust and Trustworthy Computing: 8th International Conference, TRUST 2015 …, 2015 | 33 | 2015 |
TMSUI: A trust management scheme of USB storage devices for industrial control systems B Yang, Y Qin, Y Zhang, W Wang, D Feng Information and Communications Security: 17th International Conference …, 2016 | 26 | 2016 |
TEEM: A user-oriented trusted mobile device for multi-platform security applications W Feng, D Feng, G Wei, Y Qin, Q Zhang, D Chang Trust and Trustworthy Computing: 6th International Conference, TRUST 2013 …, 2013 | 24 | 2013 |
Minimal kernel: an operating system architecture for {TEE} to resist board level physical attacks S Zhao, Q Zhang, Y Qin, W Feng, D Feng 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 22 | 2019 |
Trusttokenf: A generic security framework for mobile two-factor authentication using trustzone Y Zhang, S Zhao, Y Qin, B Yang, D Feng 2015 IEEE Trustcom/BigDataSE/ISPA 1, 41-48, 2015 | 20 | 2015 |
Security analysis of SM2 key exchange protocol in TPM2. 0 S Zhao, L Xi, Q Zhang, Y Qin, D Feng Security and Communication Networks 8 (3), 383-395, 2015 | 20 | 2015 |
TSD: a flexible root of trust for the cloud D Chang, X Chu, Y Qin, D Feng 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 19 | 2012 |
A lightweight anonymous mobile shopping scheme based on DAA for trusted mobile platform B Yang, D Feng, Y Qin 2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014 | 16 | 2014 |
The theory and practice in the evolution of trusted computing D Feng, Y Qin, W Feng, J Shao Chinese science bulletin 59, 4173-4189, 2014 | 14 | 2014 |
Type-based analysis of protected storage in the TPM J Shao, D Feng, Y Qin Information and Communications Security: 15th International Conference …, 2013 | 13 | 2013 |
Secure code updates for smart embedded devices based on PUFs W Feng, Y Qin, S Zhao, Z Liu, X Chu, D Feng Cryptology and Network Security: 16th International Conference, CANS 2017 …, 2018 | 12 | 2018 |
AEP-M: Practical anonymous E-payment for mobile devices using ARM trustzone and divisible E-cash B Yang, K Yang, Z Zhang, Y Qin, D Feng Information Security: 19th International Conference, ISC 2016, Honolulu, HI …, 2016 | 12 | 2016 |
Formal analysis of TPM2. 0 key management APIs Q Zhang, S Zhao, Y Qin, D Feng Chinese science bulletin 59, 4210-4224, 2014 | 10 | 2014 |
Automated proof for authorization protocols of TPM 2.0 in computational model W Wang, Y Qin, D Feng Information Security Practice and Experience: 10th International Conference …, 2014 | 9 | 2014 |
Direct anonymous attestation in practice: Implementation and efficient revocation L Xi, D Feng, Y Qin, F Wei, J Shao, B Yang 2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014 | 8 | 2014 |
Formal analysis of HMAC authorisation in the TPM2. 0 specification J Shao, Y Qin, D Feng IET Information Security 12 (2), 133-140, 2018 | 7 | 2018 |