In virtualized and dynamical cloud computing environment, all resources such as infrastructure, hardware,platform, software and data can be virtualized and
Till now, the types of attacks for cryptographic device are usually distinguished as leakage and tampering attacks respectively.The former, also known as si
The MSP problem and its relevant polynomial-time heuristic algorithm (Z-H algorithm) proposed in [1] provided a promising solution to a series of NP problem