共 50 条
- [2] Cryptographically Secure Biometrics [J]. BIOMETRIC TECHNOLOGY FOR HUMAN IDENTIFICATION VII, 2010, 7667
- [3] Cryptographically Secure Shields [J]. 2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2014, : 25 - 31
- [4] Cryptographically secure identity certificates [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL V, PROCEEDINGS: DESIGN AND IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS INDUSTRY TECHNOLOGY TRACKS MACHINE LEARNING FOR SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING SIGNAL PROCESSING FOR EDUCATION, 2004, : 413 - 416
- [5] Cryptographically Secure Detection of Injection Attacks [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2240 - 2242
- [6] Cryptographically Secure Bloom-Filters [J]. TRANSACTIONS ON DATA PRIVACY, 2009, 2 (02) : 131 - 139
- [7] On cryptographically secure vectorial Boolean functions [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 20 - 28
- [8] A cryptographically secure image watermarking scheme [J]. MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1013 - 1018
- [9] QueryShield: Cryptographically Secure Analytics in the Cloud [J]. COMPANION OF THE 2024 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, SIGMOD-COMPANION 2024, 2024, : 436 - 439