Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Novel Blockchain-Based Revocable Permission Management on CP-ABE Scheme

    Relying on the characteristics of decentralized, tamper-proof, and traceable, blockchain technology has begun to be widely used in permission management. It can be used for access control by using smart contra...

    Qianchuan Xv, Yubo Song, Xuan Li, Aiqun Hu in Advances in Artificial Intelligence and Se… (2021)

  2. No Access

    Chapter and Conference Paper

    Neural Control Based Research of Endogenous Security Model

    With the development of information technology, the architecture of information system has become increasingly complex, and the performance of terminal equipment has become stronger. The existing centralized d...

    Tao Li, Xu Hu, Aiqun Hu in Artificial Intelligence and Security (2021)

  3. No Access

    Chapter and Conference Paper

    Automated Authentication of Large-Scale IoT Devices with Hybrid Feature Selection

    Nowadays, large-scale IoT (Internet of Things) devices are connected to the network. However, due to the simplicity, limited memory and poor computing power of most IoT devices, it is difficult to apply comple...

    Qi Chen, Yubo Song, Aiqun Hu in Advances in Artificial Intelligence and Security (2021)

  4. No Access

    Article

    Trusted mobile model based on DTE technology

    Due to increasing demands for mobile security, the Trusted Computing Group organized a special group—Mobile Phone Working Group (MPWG) to deal with mobile security specification business. Though MPWG proposes ...

    Tao Li, Aiqun Hu in International Journal of Information Security (2015)

  5. No Access

    Chapter and Conference Paper

    Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme

    Hardware Trojan has emerged as a major security concern for integrated circuits. This paper presents a novel design obfuscation scheme against hardware Trojan attacks based on chaos finite state machine (FSM) ...

    Mingfu Xue, Jian Wang, Youdong Wang, Aiqun Hu in Cloud Computing and Security (2015)