共 18 条
[1]
[Anonymous], 2010, P ACM MOBISYS, DOI [10.1145/1814433.1814441, DOI 10.1145/1814433.1814441]
[2]
[Anonymous], 2011, P 9 INT C MOB SYST A
[3]
Shielding Applications from an Untrusted Cloud with Haven
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2015, 33 (03)
[5]
Chun BG, 2011, EUROSYS 11: PROCEEDINGS OF THE EUROSYS 2011 CONFERENCE, P301
[6]
Freedman M.J., 2004, ADV CRYPTOLOGY EUROC
[7]
Kiayias A., 2005, P FIN CRYPT
[9]
Kosta S., 2013, 5 USENIX WORKSH HOT
[10]
Kosta S, 2012, IEEE INFOCOM SER, P945, DOI 10.1109/INFCOM.2012.6195845