共 50 条
- [1] Cryptographic Protocols for Secure Cloud Computing [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 301 - 310
- [2] A Cryptographic Scheme for Secure Cloud Computing [J]. 2013 10TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE), 2013, : 221 - 226
- [3] Execution Assurance for Massive Computing Tasks [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (06): : 1343 - 1351
- [5] A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software [J]. 2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
- [6] Towards a high assurance secure computing platform [J]. HASE 2007: 10TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2007, : 381 - 382
- [7] Secure routing using factual correctness [J]. NETWORKING 2006: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2006, 3976 : 1197 - 1203
- [8] A secure cryptographic cloud communication using DNA cryptographic technique [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 791 - 798
- [9] Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 765 - 774