Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference65 articles.
1. Aciicmez O, Schindler W, Cetin K Koc (2005) , “Improving brumley and boneh timing attack on unprotected SSL implementations,” in Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS’05). Alexandria, VA, pp. 139–146.
2. Aciicmez O, Seifert JP, Koc CK (2007) Micro-architectural cryptanalysis. IEEE Secur Priv 5(4):62–64
3. Ahmad J, Khan MA, Ahmed F, Khan JS (2017) A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation. Neural Comput & Applic:1–11.
https://doi.org/10.1007/s00521-017-2970-3
4. An X. Xhafa F, Cai W, Ma J, Wei F (2016) “Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage” in Elsevier Ltd, 1–13.
5. Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献