共 50 条
- [21] Securing Cryptographic Keys in the Cloud: A Survey IEEE CLOUD COMPUTING, 2016, 3 (04): : 42 - +
- [22] Security of biased sources for cryptographic keys CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, 20 : 287 - 302
- [23] PGP cryptographic keys and key rings 5th RoEduNet IEEE International Conference, Proceedings, 2006, : 138 - 141
- [24] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience The Journal of Supercomputing, 2019, 75 : 3099 - 3122
- [25] A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience JOURNAL OF SUPERCOMPUTING, 2019, 75 (06): : 3099 - 3122
- [26] Leakage Quantification of Cryptographic Operations ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2010, PT I, 2010, 6426 : 685 - +
- [29] Binding Cryptographic Keys into Biometric Data: Optimization Journal of Computer and Systems Sciences International, 2020, 59 : 699 - 711
- [30] Embedding renewable cryptographic keys into noisy data International Journal of Information Security, 2010, 9 : 193 - 208