ZHENG GONG1, YU LONG2, XUAN HONG2 AND KEFEI CHEN2,3
1Distributed and Embedded Security Group
Faculty of Electrical Engineering, Mathematics and Computer Science
University of Twente
Enschede, 7500, the Netherlands
2Department of Computer Science and Engineering
Shanghai Jiaotong University
Shanghai, 200240 P.R. China
3National Laboratory of Modern Communications
Chengdu, 610041 P.R. China