共 57 条
[1]
Acar T, 2010, LECT NOTES COMPUT SC, V6110, P403
[2]
[Anonymous], 2012, P 2012 ACM C COMP CO
[3]
[Anonymous], 2008, 5246 RFC
[4]
Predictive Black-Box Mitigation of Timing Channels
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:297-307
[5]
Avalle Matteo, 2011, International Journal of Secure Software Engineering, V2, P34, DOI 10.4018/jsse.2011100103
[6]
Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
[J].
17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2004,
:204-218
[7]
Backes M., 2010, CCS
[8]
Backes M., 2009, FCS
[9]
Backes M, 2012, LECT NOTES COMPUT SC, V6993, P1, DOI 10.1007/978-3-642-27375-9_1
[10]
A concrete security treatment of symmetric encryption
[J].
38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
1997,
:394-403