共 50 条
- [21] Meteor: Cryptographically Secure Steganography for Realistic Distributions [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 1529 - 1548
- [22] CRYPTOGRAPHICALLY SECURE RADIOS BASED ON DIRECTIONAL MODULATION [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2014,
- [23] A secure high-speed identification scheme for RFID using bloom filters [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 717 - 722
- [24] An Ultrafast Cryptographically Secure Pseudorandom Number Generator [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 267 - 291
- [28] SFour: A Protocol for Cryptographically Secure Record Linkage at Scale [J]. 2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020), 2020, : 277 - 288
- [29] Correlation properties of a class of cryptographically secure spreading sequences [J]. IEEE ISSSTA '96 - IEEE FOURTH INTERNATIONAL SYMPOSIUM ON SPREAD SPECTRUM TECHNIQUES & APPLICATIONS, PROCEEDINGS, VOLS 1-3, 1996, : 945 - 949
- [30] A cryptographically secure ew database with selective random access [J]. MILCOM 97 PROCEEDINGS, VOLS 1-3, 1997, : 1407 - 1411