共 43 条
- [2] [Anonymous], 2023, Raspberry pi 4 model-b
- [3] Bakas A, 2019, Report 2019/813
- [4] Bosch Christoph, 2012, Information Security. Proceedings of the 15th International Conference, ISC 2012, P224, DOI 10.1007/978-3-642-33383-5_14
- [6] Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1465 - 1482
- [7] Σοφοζ - Forward Secure Searchable Encryption [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1143 - 1154
- [8] Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
- [9] Structured Encryption and Controlled Disclosure [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 577 - 594
- [10] Chee-Yong Chan, 1998, SIGMOD Record, V27, P355, DOI 10.1145/276305.276336