共 41 条
[11]
Cloud-based adaptive compression and secure management services for 3D healthcare data
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2015, 43-44
:120-134
[13]
Cramer R, 2002, LECT NOTES COMPUT SC, V2332, P45
[14]
Damgård I, 2013, LECT NOTES COMPUT SC, V8270, P140, DOI 10.1007/978-3-642-42045-0_8
[15]
Efficient Public-Key Cryptography in the Presence of Key Leakage
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010,
2010, 6477
:613-631
[16]
Dodis Y, 2009, ACM S THEORY COMPUT, P621
[17]
Leakage-Resilient Cryptography
[J].
PROCEEDINGS OF THE 49TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE,
2008,
:293-+
[19]
Galindo David, 2012, Computer Security - ESORICS 2012. Proceedings 17th European Symposium on Research in Computer Security, P627, DOI 10.1007/978-3-642-33167-1_36
[20]
Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251