共 25 条
[1]
Blanton M, 2011, LECT NOTES COMPUT SC, V6879, P190, DOI 10.1007/978-3-642-23822-2_11
[2]
Detection of selective forwarding attacks in heterogeneous sensor networks
[J].
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13,
2008,
:1583-1587
[3]
Buhan I., 2008, P 16 EUR SIGN PROC C, P1
[4]
Homomorphic Encryption for Arithmetic of Approximate Numbers
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I,
2017, 10624
:409-437
[5]
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[8]
Secret Rate - Privacy Leakage in Biometric Systems
[J].
2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4,
2009,
:2251-2255
[9]
Jain A. K., 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149), P187, DOI 10.1109/CVPR.1999.784628