共 69 条
[1]
Preventing memory error exploits with WIT
[J].
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2008,
:263-+
[2]
[Anonymous], P IEEE S SECUR PRIV
[3]
[Anonymous], 2018, IEEE 2018 INT C CYB, DOI DOI 10.1109/Cybermatics_2018.2018.00199
[4]
[Anonymous], TRUSTED PLATFORM MOD
[6]
Foundations of Hardware-Based Attested Computation and Application to SGX
[J].
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY,
2016,
:245-260
[7]
Scalable Zero Knowledge with No Trusted Setup
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III,
2019, 11694
:701-732
[8]
Aurora: Transparent Succinct Arguments for R1CS
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT I,
2019, 11476
:103-128
[9]
Scalable Zero Knowledge Via Cycles of Elliptic Curves
[J].
ALGORITHMICA,
2017, 79 (04)
:1102-1160
[10]
Ben-Sasson E, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P781