共 35 条
[1]
An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
[2]
[Anonymous], 2014, Vulnerability Summary for CVE-2014-4423
[3]
Ball J, 2013, Know Your Neighb
[4]
Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
[5]
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1431-1440
[6]
Checkoway S, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P319
[8]
Chen K., 2017, No place to hide: Edward snowden, the NSA, and the US surveillance state
[9]
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I,
2016, 10031
:844-876