Authors: |
- Yufei Yuan , Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Science, Beijing, 100190, China; University of Chinese Academy of Sciences, Beijing, 100049, China
- Wenling Wu , Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Science, Beijing, 100190, China; University of Chinese Academy of Sciences, Beijing, 100049, China
- Tairong Shi , Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Science, Beijing, 100190, China; PLA SSF Information and Engineering University, Zhengzhou, 450001,Henan
- Lei Zhang , Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Science, Beijing, 100190, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing 100878, China
- Yu Zhang , Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Science, Beijing, 100190, China; University of Chinese Academy of Sciences, Beijing, 100049, China
|