共 50 条
- [21] Protecting Obfuscation against Algebraic Attacks [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 221 - 238
- [22] A Recipe for Protecting Against Speculation Attacks [J]. COMMUNICATIONS OF THE ACM, 2021, 64 (12) : 104 - 104
- [24] Protecting against attacks on open systems [J]. I&CS-INSTRUMENTATION & CONTROL SYSTEMS, 1998, 71 (02): : 51 - 55
- [26] Protecting the Grid Against MAD Attacks [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (03): : 1310 - 1326
- [27] Trade-offs in Protecting KECCAK Against Combined Side-Channel and Fault Attacks [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 285 - 302
- [28] Protecting Location Privacy against Inference Attacks [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 711 - 713
- [29] Protecting JPEG Images Against Adversarial Attacks [J]. 2018 DATA COMPRESSION CONFERENCE (DCC 2018), 2018, : 137 - 146