共 50 条
- [31] Ergodic Secrecy Capacity of Cooperative NOMA System with Untrusted User Wireless Personal Communications, 2023, 133 : 181 - 198
- [34] Secure Set Intersection with Untrusted Hardware Tokens TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 1 - +
- [35] Using a Network of Untrusted Computers for Secure Computing PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON AUTONOMIC AND AUTONOMOUS SYSTEMS (ICAS 2011), 2011, : 57 - 61
- [37] On secure framework for web services in untrusted environment ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2005: OTM 2005 WORKSHOPS, PROCEEDINGS, 2005, 3762 : 79 - 88
- [39] A secure jailing system for confining untrusted applications SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 414 - +
- [40] IRS ASSISTED SECURE NOMA FOR UNTRUSTED USERS 2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING WORKSHOPS, ICASSPW 2024, 2024, : 356 - 360