共 36 条
[1]
Androulaki Elli, 2014, Trust and Trustworthy Computing. 7th International Conference, TRUST 2014. Proceedings: LNCS 8564, P161, DOI 10.1007/978-3-319-08593-7_11
[2]
Androulaki E., 2013, LNCS, V7859, P34, DOI [DOI 10.1007/978-3-642-39884-1, 10.1007/978-3-642-39884-14, DOI 10.1007/978-3-642-39884-14]
[3]
[Anonymous], 2013, P 2013 ECRIME RES SU, DOI DOI 10.1109/ECRS.2013.6805780
[4]
[Anonymous], 2014, Data privacy management, autonomous spontaneous security, and security assurance
[5]
Differentially Private Smart Metering with Battery Recharging
[J].
DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013,
2014, 8247
:194-212
[6]
Provably Secure and Practical Onion Routing
[J].
2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2012,
:369-385
[7]
Bar-Yehuda R., 1985, Analysis and Design of Algorithms for Combinatorial Problems, Udine, 1982,, V109, P27
[8]
Ben Jaballah W, 2018, CONSUM COMM NETWORK
[9]
Zerocash: Decentralized Anonymous Payments from Bitcoin
[J].
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014),
2014,
:459-474
[10]
Bissias G., 2014, Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES 2014, Scottsdale, AZ, USA, November 3, 2014, P149, DOI DOI 10.1145/2665943.2665955