共 39 条
[1]
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:5-17
[2]
[Anonymous], APPL US DIFF PRIV IS
[3]
[Anonymous], CAN IPHONE TRANSF WA
[4]
[Anonymous], 2016, PETROCHEMICAL APPL, DOI DOI 10.1109/INFOCOM.2016.7524346
[5]
[Anonymous], HIPAA BREACH CLOUD
[6]
Bilogrevic I, 2014, LECT NOTES COMPUT SC, V8713, P128, DOI 10.1007/978-3-319-11212-1_8
[7]
Machine Learning Classification over Encrypted Data
[J].
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015),
2015,
[9]
Corrigan-Gibbs H, 2017, PROCEEDINGS OF NSDI '17: 14TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, P259
[10]
Dutta MK, 2013, INT CONF CONTEMP, P108, DOI 10.1109/IC3.2013.6612172