共 50 条
- [42] The design of a cryptographic security architecture USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 153 - 168
- [43] Cryptographic Security of Individual Instances INFORMATION THEORETIC SECURITY, 2009, 4883 : 195 - +
- [44] On the Bit Security of Cryptographic Primitives ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT I, 2018, 10820 : 3 - 28
- [46] Opportunities for Genetic Improvement of Cryptographic Code PROCEEDINGS OF THE 2022 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION, GECCO 2022, 2022, : 1928 - 1929
- [47] Project TRANSPROSE:: Reconciling mobile-code security with execution efficiency DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 196 - 210
- [48] Exploiting OS-level mechanisms to implement mobile code security ICECCS 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2005, : 234 - 243
- [49] SECURITY RISKS IN JAVA']JAVA-BASED MOBILE CODE SYSTEMS SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2006, 7 (04): : 1 - 11