ZHENG GONG1, ZHENG HUANG2, WEIDONG QIU2 AND KEFEI CHEN3
1Distributed and Embedded Security Group
Faculty of EEMCS, University of Twente
PO Box 217, 7500 AE Enschede, Netherlands
E-mail: cis.gong@gmail.com
2School of Information Security Engineering
3Department of Computer Science and Engineering
Shanghai Jiaotong University
Shanghai, 200240 P.R. China
E-mail: {huang-zheng; qiuwd; kfchen}@sjtu.edu.cn