共 41 条
[1]
Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2014, 16 (01)
:337-368
[2]
Towards Understanding the Known-Key Security of Block Ciphers
[J].
FAST SOFTWARE ENCRYPTION (FSE 2013),
2014, 8424
:348-366
[3]
Bacis E., 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, P217
[4]
Beckel C., 2014, P 1 ACM C EMB SYST E, P80, DOI [DOI 10.1145/2674061.2674064, 10.1145/2674061.2674064]
[5]
Bellare M., 2013, P 22 USENIX C SEC, P1, DOI DOI 10.1109/MPRV.2013.43
[6]
Message-Locked Encryption and Secure Deduplication
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013,
2013, 7881
:296-312
[7]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[8]
Boneh D, 2013, LECT NOTES COMPUT SC, V8042, P410, DOI 10.1007/978-3-642-40041-4_23
[9]
Reclaiming space from duplicate files in a serverless distributed file system
[J].
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS,
2002,
:617-624
[10]
Eijs H., 2019, Pycryptodome-the Python cryptography toolkit