共 50 条
- [2] Integrity-aware mode of stream cipher [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (01): : 58 - 65
- [3] Enforcing Executing-Implies-Verified with the Integrity-Aware Processor [J]. TRUST AND TRUSTWORTHY COMPUTING, TRUST 2011, 2011, 6740 : 202 - 216
- [4] Encryption Schemes based on a Single Permutation: PCBC, POFB, PCFB and PCTR [J]. ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 452 - 460
- [5] Integrity-aware bandwidth guarding approach in P2P networks [J]. NETWORKING 2007: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2007, 4479 : 1060 - +
- [6] Signal Integrity-Aware Virtual Prototyping of Field Bus-Based Embedded Systems [J]. IEEE TRANSACTIONS ON COMPONENTS PACKAGING AND MANUFACTURING TECHNOLOGY, 2013, 3 (12): : 2081 - 2091
- [8] Modeling Power Consumption at System-Level for Design of Power Integrity-Aware AMS-Circuits [J]. 2015 18TH FORUM ON SPECIFICATION AND DESIGN LANGUAGES (FDL), 2015, : 32 - 39
- [10] IA-CTR: Integrity-Aware Conventional Counter Mode for Secure and Efficient Communication in Wireless Sensor Networks [J]. Wireless Personal Communications, 2017, 94 : 467 - 479