共 50 条
- [42] Secure Control Against Replay Attacks [J]. 2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, : 911 - 918
- [43] A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data [J]. 2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 111 - 116
- [46] Protecting Location Privacy against Inference Attacks [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 711 - 713
- [47] Protecting JPEG Images Against Adversarial Attacks [J]. 2018 DATA COMPRESSION CONFERENCE (DCC 2018), 2018, : 137 - 146
- [48] On Protecting SPHINCS+ Against Fault Attacks [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (02): : 80 - 114
- [50] SABRE: Protecting Bitcoin against Routing Attacks [J]. 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,