dblp.uni-trier.dewww.uni-trier.de

Fangyong Hou

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
9EEMengqi Zeng, Fangyong Hou, Dawu Gu, Yuanyuan Zhang, NingNan Song: Efficient Authenticated Encryption for Hybrid Hard Drives Based on GCM. HPCC 2008: 964-970
8EEFangyong Hou, Dawu Gu, Nong Xiao, Zhiping Cai: Efficient disk encryption and verification through trusted nonce. ISCC 2008: 304-309
2006
7EEFangyong Hou, Hongjun He, Zhiying Wang, Kui Dai: An Efficient Way to Build Secure Disk. ISPEC 2006: 290-301
2005
6EEFangyong Hou, Zhiying Wang, Kui Dai, Yun Liu: Protecting Mass Data Basing on Small Trusted Agent. ISPEC 2005: 362-373
2004
5EEFangyong Hou, Zhiying Wang, Yuhua Tang, Jifeng Liu: Verify Memory Integrity Basing on Hash Tree and MAC Combined Approach. EUC 2004: 869-878
4EEFangyong Hou, Zhiying Wang, Yuhua Tang, Zhen Liu: Protecting integrity and confidentiality for data communication. ISCC 2004: 357-362
3 Fangyong Hou, Zhiying Wang, Zhen Liu, Yuhua Tang, Yun Liu: Building Efficient and Secure Communication for Grid. PDPTA 2004: 894-900
2 Fangyong Hou, Zhiying Wang, Yuhua Tang, Zhen Liu, Jin Zhou: Protect Data Stored on Remote Server. PDPTA 2004: 929-938
2003
1EEFangyong Hou, Zhiying Wang, Zhen Liu, Yun Liu: Avoid Powerful Tampering by Malicious Host. GCC (1) 2003: 907-915

Coauthor Index

1Zhiping Cai [8]
2Kui Dai [6] [7]
3Dawu Gu [8] [9]
4Hongjun He [7]
5Jifeng Liu [5]
6Yun Liu [1] [3] [6]
7Zhen Liu [1] [2] [3] [4]
8NingNan Song [9]
9Yuhua Tang [2] [3] [4] [5]
10Zhiying Wang [1] [2] [3] [4] [5] [6] [7]
11Nong Xiao [8]
12Mengqi Zeng [9]
13Yuanyuan Zhang [9]
14Jin Zhou [2]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)