共 61 条
[31]
Camenisch J, 2009, LECT NOTES COMPUT SC, V5443, P481
[32]
Dahl M, 2012, LECT NOTES COMPUT SC, V6993, P98, DOI 10.1007/978-3-642-27375-9_6
[33]
Dini G, 2012, LECT NOTES COMPUT SC, V7371, P90, DOI 10.1007/978-3-642-31540-4_7
[35]
Analytical and empirical analysis of countermeasures to traffic analysis attacks
[J].
2003 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, PROCEEDINGS,
2003,
:483-492
[36]
Ganan Carlos, 2012, Information and Communication Security. 14th International Conference (ICICS 2012). Proceedings, P22, DOI 10.1007/978-3-642-34129-8_3
[38]
Goodrich MT, 2002, LECT NOTES COMPUT SC, V2433, P372