共 50 条
- [3] An empirical approach towards characterization of encrypted and unencrypted VoIP traffic [J]. Multimedia Tools and Applications, 2020, 79 : 603 - 631
- [4] Effectiveness Analysis of Encrypted and Unencrypted Bit Sequence Identification Based on Randomness Test [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1588 - 1591
- [5] An Abstract Machine for Integrating Heterogeneous Web Applications [J]. 2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,
- [8] Computing on Encrypted Data (Extended Abstract) [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2008, 5352 : 148 - 153
- [9] Verifiable Computation on Outsourced Encrypted Data [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 273 - 291
- [10] Towards Robust Computation on Encrypted Data [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 216 - 233