共 50 条
- [21] A Secure DFT Architecture Protecting Crypto Chips Against Scan-Based Attacks [J]. IEEE ACCESS, 2019, 7 : 22206 - 22213
- [24] Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation [J]. Science China Information Sciences, 2018, 61
- [25] A HYBRID PROTOCOL TO SECURE THE CLOUD FROM INSIDER THREATS [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2014, : 65 - 69
- [26] Database Intrusion Detection: Protecting Against the Insider Threat [J]. AMCIS 2012 PROCEEDINGS, 2012,
- [27] Efficient and Secure Techniques for Protecting Data in the Cloud [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
- [28] Protecting Obfuscation against Algebraic Attacks [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 221 - 238
- [30] A Recipe for Protecting Against Speculation Attacks [J]. COMMUNICATIONS OF THE ACM, 2021, 64 (12) : 104 - 104