共 50 条
- [2] Modeling The Side-Channel Attacks in Data Deduplication with Game Theory 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 200 - 208
- [4] Secure and efficient big data deduplication in fog computing Soft Computing, 2020, 24 : 5671 - 5682
- [5] Cache Side-Channel Attacks in Cloud Computing PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 138 - 146
- [6] Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing 2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 285 - 293
- [7] Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication TSINGHUA SCIENCE AND TECHNOLOGY, 2023, 28 (01): : 1 - 12
- [8] Efficient Solution to Secure ECC Against Side-channel Attacks CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (03): : 471 - 475
- [9] SecDir: A Secure Directory to Defeat Directory Side-Channel Attacks PROCEEDINGS OF THE 2019 46TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA '19), 2019, : 332 - 345
- [10] How secure is your cache against side-channel attacks? 50TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), 2017, : 341 - 353