共 34 条
[1]
Berthold O., 2001, Designing Privacy Enhancing Technologies. International Workshop on Design Issues in Anonymity and Unobservability. Proceedings (Lecture Notes in Computer Science Vol.2009), P30
[2]
Chaum David, 2017, Applied Cryptography and Network Security. 15th International Conference, ACNS 2017. Proceedings: LNCS 10355, P557, DOI 10.1007/978-3-319-61204-1_28
[4]
Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow
[J].
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2010,
:191-206
[5]
Danezis G, 2005, LECT NOTES COMPUT SC, V3424, P35
[6]
Danezis G, 2003, LECT NOTES COMPUT SC, V2760, P1
[7]
Sphinx: A Compact and Provably Secure Mix Format
[J].
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2009,
:269-+
[9]
Díaz C, 2004, LECT NOTES COMPUT SC, V3193, P141
[10]
Díaz C, 2003, LECT NOTES COMPUT SC, V2482, P54