Zhang Yichen, received her B.S. degree in production process autormtion from Qiqihar Univer- sity in 1995. She was a lecturer with the College of Computer and Control Engineering, Qiqihar University, China from 1995 to 2004. She is currently a lecturer and a Ph.D. candidate at the College of Computerand Information Engineering, Hohai University, Nanjing, China.Her research interests include trusted computing, cryptographyand network security. Li Jiguo, received his B.S. degree in rnathermtics from Heilongjiang University, Harbin, China in 1996, and his M.S. degree in mathematics and Ph. D. degree in corrputer science from Harbin Institute of Technology, Harbin, China in 2000, and 2003 respectively. He is currently a professor in the College of Corrputer and Information Engineering, Hohai University, Nanjing, China. His research interests include cryptography, network security, wireless security and trusted corrouting etc. He has published more than 60 scientific papers and two books. He has served as a PC member of several international conferences and the reviewer of some international journals and con- ferences. Sun Chuanming, received the B.S. and M.S. degrees in corrputer science and technology from Hohai University, Nanjing, China in 2006 and 2009 respectively. His research interests include trusted computing, cryptography and network security.