共 53 条
[31]
Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms
[J].
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:795-806
[32]
Dynamic Searchable Encryption via Blind Storage
[J].
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014),
2014,
:639-654
[33]
Qian L, 2009, LECT NOTES COMPUT SC, V5931, P626, DOI 10.1007/978-3-642-10665-1_63
[34]
Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 80
:421-429
[36]
Stehlé D, 2010, LECT NOTES COMPUT SC, V6477, P377, DOI 10.1007/978-3-642-17373-8_22
[37]
Stolfo S. J., 2012, 2012 IEEE CS Security and Privacy Workshops (SPW 2012), P125, DOI 10.1109/SPW.2012.19