共 37 条
[1]
AGRAWAL R, 1995, PROC INT CONF DATA, P3, DOI 10.1109/ICDE.1995.380415
[2]
[Anonymous], 2011, USENIX SEC S
[3]
[Anonymous], 2012, Proceedings of the Eighth Symposium on Usable Privacy and Security, DOI 10.1145/2335356.2335360
[4]
[Anonymous], 2010, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, DOI [10.1145/1755688.1755732, DOI 10.1145/1755688.1755732]
[5]
[Anonymous], 2011, P BLACK HAT AB DHAB
[6]
[Anonymous], 2012, Proceedings of the fth ACM conference on Security and Privacy in Wireless and Mobile Networks
[7]
[Anonymous], 2012, NDSS
[8]
[Anonymous], POLICY 2010
[9]
[Anonymous], 2011, Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, DOI [10.1145/2184489.2184500, DOI 10.1145/2184489.2184500]
[10]
[Anonymous], 2012, P 2 ACM C DATA APPL, DOI DOI 10.1145/2133601.2133640