共 50 条
- [21] Secure isolation of untrusted legacy applications USENIX ASSOCIATION PROCEEDING OF THE 21ST LARGE INSTALLATION SYSTEMS ADMINISTRATION CONFERENCE, 2007, : 117 - 130
- [22] Secure execution of computations in untrusted hosts RELIABLE SOFTWARE TECHNOLOGIES - ADA - EUROPE 2006, PROCEEDINGS, 2006, 4006 : 106 - 118
- [23] Secure service publishing with untrusted registries SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 175 - 179
- [24] Secure Online Banking on Untrusted Computers PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 720 - 722
- [25] Autonomous Aggregate Data Analytics in Untrusted Cloud 2018 IEEE FIRST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND KNOWLEDGE ENGINEERING (AIKE), 2018, : 138 - 141
- [27] An Approach for Securing Critical Applications in Untrusted Clouds 2018 26TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP 2018), 2018, : 436 - 440
- [29] Decoding Orders and Power Allocation for Untrusted NOMA: A Secrecy Perspective 2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2020,