-
Chapter and Conference Paper
A Novel Blockchain-Based Revocable Permission Management on CP-ABE Scheme
Relying on the characteristics of decentralized, tamper-proof, and traceable, blockchain technology has begun to be widely used in permission management. It can be used for access control by using smart contra...
-
Chapter and Conference Paper
Neural Control Based Research of Endogenous Security Model
With the development of information technology, the architecture of information system has become increasingly complex, and the performance of terminal equipment has become stronger. The existing centralized d...
-
Chapter and Conference Paper
Automated Authentication of Large-Scale IoT Devices with Hybrid Feature Selection
Nowadays, large-scale IoT (Internet of Things) devices are connected to the network. However, due to the simplicity, limited memory and poor computing power of most IoT devices, it is difficult to apply comple...
-
Article
Trusted mobile model based on DTE technology
Due to increasing demands for mobile security, the Trusted Computing Group organized a special group—Mobile Phone Working Group (MPWG) to deal with mobile security specification business. Though MPWG proposes ...
-
Chapter and Conference Paper
Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme
Hardware Trojan has emerged as a major security concern for integrated circuits. This paper presents a novel design obfuscation scheme against hardware Trojan attacks based on chaos finite state machine (FSM) ...