共 17 条
[1]
Alpers S, 2018, EXISTING SOFTWARE WW
[2]
Alpers S, 2017, PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), P1460, DOI 10.1109/CompComm.2017.8322784
[3]
[Anonymous], 2012, Financial cryptography and data security
[4]
[Anonymous], 2017, LOCAL COURT BAD HERS
[5]
Backes M, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P691
[6]
Bishop M., 2002, Computer Security: Art and Science
[7]
Bodden E., 2013, DATENSCHUTZ DATENSIC, V37, P720
[8]
Christl Wolfie., 2016, NETWORKS CONTROL REP
[9]
Felt AP, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P627
[10]
Felt AdriennePorter., 2011, P 2 USENIX C WEB APP, P7