共 50 条
- [21] Encrypted Computing Speed, Security and Provable Obfuscation against Insiders 2017 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2017,
- [22] Secure Obfuscation in a Weak Multilinear Map Model THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 241 - 268
- [23] Fully Secure and Fast Signing from Obfuscation CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 659 - 673
- [24] Secure and Efficient Traffic Obfuscation for Smart Home 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 6073 - 6078
- [25] NetHide: Secure and Practical Network Topology Obfuscation PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 693 - 709
- [26] Secure Ranking over Encrypted Documents IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (12): : 2954 - 2955
- [27] Secure kNN Computation on Encrypted Databases ACM SIGMOD/PODS 2009 CONFERENCE, 2009, : 139 - 152
- [28] Designing secure indexes for encrypted databases DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 54 - 68
- [29] Why Your Encrypted Database Is Not Secure PROCEEDINGS OF THE 16TH WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS (HOTOS 2017), 2017, : 162 - 168
- [30] Architecture and design of a secure encrypted microprocessor Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (08): : 81 - 84