共 50 条
- [1] Secure Authentication from a Weak Key, without Leaking Information [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 246 - 265
- [2] Speculative Privacy Tracking (SPT): Leaking Information From Speculative Execution Without Compromising Privacy [J]. PROCEEDINGS OF 54TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, MICRO 2021, 2021, : 607 - 622
- [3] Secure Computation with Information Leaking to an Adversary [J]. STOC 11: PROCEEDINGS OF THE 43RD ACM SYMPOSIUM ON THEORY OF COMPUTING, 2011, : 715 - 724
- [5] Leaking Information Through Cache LRU States [J]. 2020 IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2020), 2020, : 139 - 152
- [6] Downstream Information Leaking and Information Sharing Between Partially Informed Retailers [J]. Journal of Industry, Competition and Trade, 2020, 20 : 733 - 760
- [7] Downstream Information Leaking and Information Sharing Between Partially Informed Retailers [J]. JOURNAL OF INDUSTRY COMPETITION & TRADE, 2020, 20 (04): : 733 - 760
- [8] Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata [J]. PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2016, : 571 - 586
- [9] Security policy for information erasing and leaking in multithreaded codes [J]. Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2010, 44 (05): : 854 - 862
- [10] Resilience to Leaking - Dynamic Systems Modeling of Information Security [J]. PLOS ONE, 2012, 7 (12):