共 46 条
[1]
aws.amazon.com, AM CLOUD
[3]
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[4]
BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic
[J].
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17),
2017,
:561-574
[5]
Leakage-Abuse Attacks Against Searchable Encryption
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:668-679
[6]
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[9]
Fuhr T, 2007, LECT NOTES COMPUT SC, V4784, P228
[10]
Enabling Secure and Dynamic Deep Packet Inspection in Outsourced Middleboxes
[J].
SCC'18: PROCEEDINGS OF THE 6TH INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING,
2018,
:49-55