共 50 条
- [1] Automated Security Proof for Symmetric Encryption Modes [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2009: INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5913 : 39 - +
- [2] A Mechanized Proof of Security for Searchable Symmetric Encryption [J]. 2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, : 481 - 494
- [3] Security enforcement on RFX storage - A selective encryption approach [J]. ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 689 - +
- [4] Enterprise Level Security with Homomorphic Encryption [J]. ICEIS: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 1, 2017, : 177 - 184
- [5] Security Service Level Agreement Measurement in Cloud: A Proof of Concept Implementation [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS), 2017,
- [6] Encryption as a Service for Data Healthcare Cloud Security [J]. 2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 48 - 54
- [8] Security Models and Proof Strategies for Plaintext-Aware Encryption [J]. Journal of Cryptology, 2014, 27 : 139 - 180
- [9] A Note on the Security Proof of Waters Identity-Based Encryption [J]. 2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL III, 2010, : 420 - 423
- [10] Service level agreement enforcement for differentiated services [J]. WIRELESS SYSTEMS AND NETWORK ARCHITECTURES IN NEXT GENERATION INTERNET, 2006, 3883 : 158 - 169