Fangyong Hou

According to our database1, Fangyong Hou authored at least 24 papers between 2003 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Ultra simple way to encrypt non-volatile main memory.
Secur. Commun. Networks, 2015

2013
Bus and memory protection through chain-generated and tree-verified IV for multiprocessors systems.
Future Gener. Comput. Syst., 2013

Novel Physically-Embedded Data Encryption for Embedded Device.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2011
Inter-Chip Authentication through I/O Character.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
Incremental hash tree for disk authentication.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Static, Dynamic and Incremental MAC Combined Approach for Storage Integrity Protection.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Efficient Encryption-Authentication of Shared Bus-Memory in SMP System.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Architecture Support for Memory Confidentiality and Integrity in Embedded Systems.
Int. J. Distributed Sens. Networks, 2009

Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery.
Proceedings of the Advances in Information Security and Assurance, 2009

Design and Implementation of Self-securing Disk.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Performance and Consistency Improvements of Hash Tree Based Disk Storage Protection.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Secure Disk with Authenticated Encryption and IV Verification.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Efficiently Protect Memory through an Independent Counter Channel.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
Secure Remote Storage through Authenticated Encryption.
Proceedings of The 2008 IEEE International Conference on Networking, 2008

Efficient disk encryption and verification through trusted nonce.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Efficient Authenticated Encryption for Hybrid Hard Drives Based on GCM.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Data privacy and integrity appropriate for disk protection.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2006
An Efficient Way to Build Secure Disk.
Proceedings of the Information Security Practice and Experience, 2006

2005
Protecting Mass Data Basing on Small Trusted Agent.
Proceedings of the Information Security Practice and Experience, 2005

2004
Protect Data Stored on Remote Server.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

Building Efficient and Secure Communication for Grid.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

Protecting integrity and confidentiality for data communication.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Verify Memory Integrity Basing on Hash Tree and MAC Combined Approach.
Proceedings of the Embedded and Ubiquitous Computing, 2004

2003
Avoid Powerful Tampering by Malicious Host.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...