共 50 条
- [2] Security Analysis of Encrypted Virtual Machines [J]. ACM SIGPLAN NOTICES, 2017, 52 (07) : 129 - 142
- [4] Security sensor providing analysis of encrypted network data [J]. WEBIST 2006: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES: INTERNET TECHNOLOGY / WEB INTERFACE AND APPLICATIONS, 2006, : 172 - +
- [5] Scrambled Database with Encrypted Query Processing: CryptDB A Computational Analysis [J]. 2017 1ST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND INFORMATION MANAGEMENT (ICISIM), 2017, : 199 - 211
- [6] Information Processing for Encrypted Database [J]. ACC 2009: ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2009, : 252 - 255
- [7] Security analysis of selectively encrypted MPEG-2 streams [J]. MULTIMEDIA SYSTEMS AND APPLICATIONS VI, 2003, 5241 : 10 - 21
- [9] Security of compressing encrypted sources [J]. CONFERENCE RECORD OF THE FORTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1-5, 2007, : 901 - 903
- [10] Encrypted database integrity in database service provider model [J]. CERTIFICATION AND SECURITY IN E-SERVICES: FROM E-GOVERNMENT TO E-BUSINESS, 2003, 127 : 165 - 174