共 47 条
[1]
Akavia A(2009)Simultaneous hardcore bits and cryptography against memory attacks TCC 2009 474-495
[2]
Goldwasser S(2015)Cloud-based adaptive compression and secure management services for 3d healthcare data Future Gen Comput Syst 1 120-134
[3]
Vaikuntanathan V(2012)Supporting software intelligence in ubiquitous environment exploits mobile agent J Amb Intell Humaniz Comput 3 141-151
[4]
Castiglione A(2009)On cryptography with auxiliary input STOC 2009 621-630
[5]
Pizzolante R(2009)Distributed agent platform with intrusion detection capabilities INCOS 2009 81-86
[6]
De Santis A(2004)Secure conjunctive keyword search over encrypted data ACNS 2004 31-45
[7]
Carpentieri B(2008)Lest we remember: Cold-boot attacks on encryption keys USENIX Sec Symp 2008 45-60
[8]
Castiglione A(2011)After-the-fact leakage in public-key encryption TCC 2011 474-495
[9]
Palmieri F(2014)Securely outsourcing attribute-based encryption with checkability IEEE Trans Parall Distribut Sys 25 2201-2210
[10]
Chang Y(2012)Public-key cryptosystems resilient to key leakage SIAM J Comput 41 772-814