共 48 条
[1]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[2]
Baror SO, 2019, INT C CYBER WARFARE, P505
[3]
Securing SSL Certificate Verification through Dynamic Linking
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:394-405
[4]
Bing Wang, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P2092, DOI 10.1109/INFOCOM.2015.7218594
[5]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[6]
Investigating Characteristics of Attacks on Public Cloud Systems
[J].
2019 6TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2019) / 2019 5TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2019),
2019,
:89-94
[7]
Camenisch J, 2002, LECT NOTES COMPUT SC, V2442, P61
[8]
Chai Q, 2012, IEEE ICC