共 20 条
[1]
[Anonymous], 2013, Proceedings of the 2013 conference on Internet measurement conference
[2]
[Anonymous], 2012, Cross-VM Side Channels and Their Use to Extract Private Keys, Computer and communications security", p, DOI DOI 10.1145/2382196.2382230
[3]
Armknecht F., 2015, A guide to fully homomorphic encryption
[4]
Chi A., 2017, P 14 USENIX S NETW S
[5]
Everspaugh A, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P547
[6]
Fayaz SK, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P817
[7]
Fayazbakhsh S.K., 2014, NSDI
[8]
Gember-Jacobson Aaron., 2014, Proceedings of the 2014 ACM conference on SIGCOMM, P163, DOI [DOI 10.1145/2619239, 10.1145/2619239]
[9]
Juels A., 2013, Proceedings of the 2013 ACM SIGSAC conference on Computer communications security, V11, P145, DOI [10.1145/2508859.2516671, DOI 10.1145/2508859.2516671]
[10]
Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1595-1606