共 50 条
- [1] Soundness of formal encryption in the presence of active adversaries [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2004, 2951 : 133 - 151
- [2] Encryption Schemes Secure Against Profiling Adversaries [J]. E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2012, 2014, 455 : 172 - 191
- [3] Completing the picture:: Soundness of formal encryption in the presence of active adversaries [J]. PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2005, 3444 : 172 - 185
- [4] Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries [J]. 2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, : 75 - 89
- [5] Privacy amplification secure against active adversaries [J]. ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 307 - 321
- [6] RFID KEY ESTABLISHMENT AGAINST ACTIVE ADVERSARIES [J]. 2009 FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2009, : 186 - +
- [7] Private Set Intersection via Searchable Encryption against Malicious Adversaries [J]. MODERN TECHNOLOGIES IN MATERIALS, MECHANICS AND INTELLIGENT SYSTEMS, 2014, 1049 : 1812 - 1819
- [8] Classifier evaluation and attribute selection against active adversaries [J]. Data Mining and Knowledge Discovery, 2011, 22 : 291 - 335
- [10] On the Security of Symmetric Encryption Against Mass Surveillance [J]. IEEE ACCESS, 2020, 8 (08): : 175625 - 175636