共 19 条
[1]
Brickell E., 2004, P ACM C COMP COMM SE, P132, DOI DOI 10.1109/TSC.2010.60
[2]
Comon-Lundh Hubert, 2012, Information Security Practice and Experience. Proceedings of the 8th International Conference, ISPEC 2012, P63, DOI 10.1007/978-3-642-29101-2_5
[3]
Comon-Lundh H, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P109
[6]
Dong Xue-wen, 2011, Journal on Communications, V32, P124
[8]
Hajiabadi M, 2013, LECT NOTES COMPUT SC, V7785, P539, DOI 10.1007/978-3-642-36594-2_30
[9]
Halpern JY, 2005, J COMPUT SECUR, V13, P483
[10]
Hughes D., 2004, Journal of Computer Security, V12, P3