Keshou Wu

Learn More
1 —Focusing on multi-machine distributed computing security problems in cloud computing, the paper has proposed a grid distributed parallel authentication model based on trusted computing, which can realize simultaneous verification of grid authentication and grid behavior on upper layer of SSL and TLS protocols. Adaptive grid authentication method is(More)
Advancements in the application of underground pipeline information have led to the increased complexity in the design and implementation of the information management system. With the underground pipelines data being managed by many different government agencies, it becomes increasing more difficult to ensure their integrity, accuracy and timeliness. In(More)
With the rapid development of VLSI (Very Large Scale Integration) circuit, IP (Intellectual Property) protection for reused technology is widely concerned. A watermarking scheme for IP protection is proposed on basis of a two dimensional chaotic mapping model (TDCM). The scheme utilizes a secure and controllable embedding model to compute the aggregation(More)