共 26 条
[1]
Abe M, 2001, LECT NOTES COMPUT SC, V2045, P136
[2]
[Anonymous], 2012, Security and Privacy in Communication Networks
[3]
[Anonymous], 2010, Technical Report
[4]
Baldimtsi F., 2013, ACM CCS 2013, P1087, DOI DOI 10.1145/2508859.2516687
[5]
Baldimtsi F, 2013, LECT NOTES COMPUT SC, V8270, P82, DOI 10.1007/978-3-642-42045-0_5
[6]
Belenkiy M, 2009, LECT NOTES COMPUT SC, V5671, P114, DOI 10.1007/978-3-642-03298-1_9
[7]
Bichsel P, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P600
[8]
Brands S., 1994, Advances in Cryptology - CRYPTO '93. 13th Annual International Cryptology Conference Proceedings, P302
[10]
Chan A, 1998, LECT NOTES COMPUT SC, V1403, P561, DOI 10.1007/BFb0054154