共 50 条
- [1] Ciphertext Retrieval against Insider Attacks for Cloud Storage [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 202 - 206
- [4] A secure communication model for defending against insider packet dropping attacks [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (10): : 2003 - 2014
- [5] Preventing Insider Attacks in the Cloud [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 488 - +
- [6] POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1493 - 1495
- [7] Protecting secret data from insider attacks [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2005, 3570 : 16 - 30
- [8] An order-specified multisignature scheme secure against active insider attacks [J]. INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 328 - 345
- [9] Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks [J]. SCIENTIFIC WORLD JOURNAL, 2014,
- [10] An overview of insider attacks in cloud computing [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12): : 2964 - 2981