共 24 条
- [2] A formal analysis for capturing replay attacks in cryptographic protocols [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 150 - +
- [4] Formal Analysis of Vote Privacy Using Computationally Complete Symbolic Attacker [J]. COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 350 - 372
- [5] An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2213 - 2221
- [7] Efficient Privacy-Preserving Federated Learning Against Inference Attacks for IoT [J]. 2023 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC, 2023,
- [8] Formal analytics for stealthy attacks against Contingency Analysis in power grids [J]. SUSTAINABLE ENERGY GRIDS & NETWORKS, 2024, 38
- [9] SPEFL: Efficient Security and Privacy-Enhanced Federated Learning Against Poisoning Attacks [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 13437 - 13451
- [10] TEC-Tree: A low-cost, parallelizable tree for efficient defense against memory replay attacks [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2007, PROCEEDINGS, 2007, 4727 : 289 - +