Aiqun HU


Detecting Hardware Trojan through Time Domain Constrained Estimator Based Unified Subspace Technique
Mingfu XUE Wei LIU Aiqun HU Youdong WANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/03/01
Vol. E97-D  No. 3  pp. 606-609
Type of Manuscript:  LETTER
Category: Dependable Computing
Keyword: 
information securityhardware securityhardware Trojan detectionunified subspace techniquetime domain constrained estimator
 Summary | Full Text:PDF

Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy
Mingfu XUE Aiqun HU Chunlong HE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/06/01
Vol. E95-D  No. 6  pp. 1694-1697
Type of Manuscript:  LETTER
Category: Dependable Computing
Keyword: 
Multi-Level Security policysecurity modelconfidentiality and integrityleast privilegeapplication-oriented logic
 Summary | Full Text:PDF