共 41 条
[31]
Bootstrapping Trust in Commodity Computers
[J].
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2010,
:414-429
[32]
Popa RA, 2011, SOSP 11: PROCEEDINGS OF THE TWENTY-THIRD ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, P85
[33]
Popa RalucaAda., 2014, NDSI
[34]
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems
[J].
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2012,
:224-238
[35]
Fuzzy identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:457-473
[36]
Sekar V, 2011, PROCEEDINGS OF THE 3RD ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'11), P21
[37]
Symmetric Cryptography in Java']Javascript
[J].
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE,
2009,
:373-381
[38]
STONE P., PIXEL PERFECT TIMING
[40]
YAO A. C.-C., 1986, IEEE S FDN COMP SCI