共 179 条
[1]
Berti F(2017)On leakage-resilient authenticated encryption with decryption leakages IACR Trans Symmetric Cryptol 2017 271-293
[2]
Pereira O(2016)Verifiable computation over large database with incremental updates IEEE Trans Comput 65 3184-3195
[3]
Peters T(2001)Electromagnetic analysis: concrete results Lecture Notes Comput Sci 2162 251-261
[4]
Standaert FX(2018)Privacy-preserving naive bayes classifiers secure against the substitution-then-comparison attack Inf Sci 444 72-88
[5]
Chen X(2015)Editorial (thematic issue: cyber security, privacy and forensics for complex systems) Int J Sens Wirel Commun Control 5 2-9208
[6]
Li J(2016)Handbook of research on modern cryptographic solutions for computer and cyber security IGI Global 77 9203-241
[7]
Weng J(2018)Advances in security and privacy of multimedia big data in mobile and cloud computing Multimed Tools Appl 412 223-298
[8]
Ma J(2017)Insight of the protection for data security under selective opening attacks Inf Sci 85 273-196
[9]
Lou W(2017)Anonymous and leakage resilient ibe and ipe Des Codes Cryptogr 4 187-3579
[10]
Gandolfi K(2013)Leakage-resilient identity-based encryption scheme Int J Grid Utility Comput 64 3569-1075