共 46 条
[31]
Komanduri S., 2011, CMUCYLAB11005
[32]
Krishnamurthy B., 2009, Proceedings of the 18th international conference on World wide web, P541, DOI 10.1145/1526709.1526782
[33]
A hierarchy of authentication specifications
[J].
10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
1997,
:31-43
[34]
Mayer J., DO NOT TRACK UNIVERS
[35]
McCune JM, 2008, EUROSYS'08: PROCEEDINGS OF THE EUROSYS 2008 CONFERENCE, P315, DOI 10.1145/1357010.1352625
[36]
McLachlan J, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P590
[37]
Olumofin F., 2011, P INT C FIN CRYPT DA
[38]
Perrig A., 2001, P INT PAR DISTR PROC, P170
[39]
Reznichenko A, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P667
[40]
Shi E, 2011, LECT NOTES COMPUT SC, V7073, P197, DOI 10.1007/978-3-642-25385-0_11