References
[1]
Fang B X. A hierarchy model on the research fields of cyberspace security technology. Chinese J Netw Inf Secur, 2016, 1: 2-7 [方滨兴. 从层次角度看网络空间安全技术的覆盖领域. 网络与信息安全学报, 2016, 1: 2-7].
Google Scholar
http://scholar.google.com/scholar_lookup?title=Fang B X. A hierarchy model on the research fields of cyberspace security technology. Chinese J Netw Inf Secur, 2016, 1: 2-7 [方滨兴. 从层次角度看网络空间安全技术的覆盖领域. 网络与信息安全学报, 2016, 1: 2-7]&
[2]
Li H, Zhang N. Suggestions on cyber security talents cultivation. Chinese J Netw Inf Secur, 2016, 1: 18-23 [李晖, 张宁. 网络空间安全学科人才培养之思考. 网络与信息安全学报, 2016, 1: 18-23].
Google Scholar
http://scholar.google.com/scholar_lookup?title=Li H, Zhang N. Suggestions on cyber security talents cultivation. Chinese J Netw Inf Secur, 2016, 1: 18-23 [李晖, 张宁. 网络空间安全学科人才培养之思考. 网络与信息安全学报, 2016, 1: 18-23]&
[3]
Li J H, Qiu W D, Meng K, et al. Discipline construction and talents training of cyberspace security. J Inf Secur Res, 2015, 1: 149-154 [李建华, 邱卫东, 孟魁, 等. 网络空间安全一级学科内涵建设和人才培养思考. 信息安全研究, 2015, 1: 149-154].
Google Scholar
http://scholar.google.com/scholar_lookup?title=Li J H, Qiu W D, Meng K, et al. Discipline construction and talents training of cyberspace security. J Inf Secur Res, 2015, 1: 149-154 [李建华, 邱卫东, 孟魁, 等. 网络空间安全一级学科内涵建设和人才培养思考. 信息安全研究, 2015, 1: 149-154]&
[4]
Danev B, Zanetti D, Capkun S. On physical-layer identification of wireless devices. ACM Comput Surv, 2012, 45: 1-29.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Danev B, Zanetti D, Capkun S. On physical-layer identification of wireless devices. ACM Comput Surv, 2012, 45: 1-29&
[5]
Tekbas
Ö H,
Serinken
N,
Üreten
O.
An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions.
Canadian J Electr Comput Eng,
2004, 29: 203-209
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions&author=Tekbas Ö H&author=Serinken N&author=Üreten O&publication_year=2004&journal=Canadian J Electr Comput Eng&volume=29&pages=203-209
[6]
Rasmussen K B, Capkun S. Implications of radio fingerprinting on the security of sensor networks. In: Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks and the Workshops, Nice, 2007. 331-340.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Rasmussen K B, Capkun S. Implications of radio fingerprinting on the security of sensor networks. In: Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks and the Workshops, Nice, 2007. 331-340&
[7]
Reising
D R,
Temple
M A,
Mendenhall
M J.
Improved wireless security for GMSK-based devices using RF fingerprinting.
Int J Electron Secur Digit Foren,
2010, 3: 41-59
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Improved wireless security for GMSK-based devices using RF fingerprinting&author=Reising D R&author=Temple M A&author=Mendenhall M J&publication_year=2010&journal=Int J Electron Secur Digit Foren&volume=3&pages=41-59
[8]
Brik V, Banerjee S, Gruteser M, et al. Wireless device identification with radiometric signatures. In: Proceedings of the 14th ACM international conference on Mobile computing and networking, San Francisco, 2008. 116-127.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Brik V, Banerjee S, Gruteser M, et al. Wireless device identification with radiometric signatures. In: Proceedings of the 14th ACM international conference on Mobile computing and networking, San Francisco, 2008. 116-127&
[9]
Gerdes R M, Daniels T E, Mina M, et al. Device identification via analog signal fingerprinting: a matched filter approach. In: Proceedings of the Network and Distributed System Security Symposium, San Diego, 2006. 1-11.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Gerdes R M, Daniels T E, Mina M, et al. Device identification via analog signal fingerprinting: a matched filter approach. In: Proceedings of the Network and Distributed System Security Symposium, San Diego, 2006. 1-11&
[10]
Gerdes
R M,
Mina
M,
Russell
S F, et al.
Physical-layer identification of wired Ethernet devices.
IEEE Trans Inf Foren Secur,
2012, 7: 1339-1353
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Physical-layer identification of wired Ethernet devices&author=Gerdes R M&author=Mina M&author=Russell S F&publication_year=2012&journal=IEEE Trans Inf Foren Secur&volume=7&pages=1339-1353
[11]
Danev B, Heydt-Benjamin T S, Capkun S. Physical-layer identification of RFID devices. In: Proceedings of the 18th Conference on USENIX Security Symposium, Montreal, 2009. 199-214.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Danev B, Heydt-Benjamin T S, Capkun S. Physical-layer identification of RFID devices. In: Proceedings of the 18th Conference on USENIX Security Symposium, Montreal, 2009. 199-214&
[12]
Dey S, Roy N, Xu W, et al. AccelPrint: imperfections of accelerometers make smartphones trackable. In: Proceedings of the Network and Distributed System Security Symposium, San Diego, 2014. 1-16.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Dey S, Roy N, Xu W, et al. AccelPrint: imperfections of accelerometers make smartphones trackable. In: Proceedings of the Network and Distributed System Security Symposium, San Diego, 2014. 1-16&
[13]
Das A, Borisov N, Caesar M. Do you hear what I hear? fingerprinting smart devices through embedded acoustic components. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Arizona, 2014. 441-452.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Das A, Borisov N, Caesar M. Do you hear what I hear? fingerprinting smart devices through embedded acoustic components. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Arizona, 2014. 441-452&
[14]
Zhou Z, Diao W, Liu X, et al. Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Arizona, 2014. 429-440.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Zhou Z, Diao W, Liu X, et al. Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Arizona, 2014. 429-440&
[15]
Maurer
U M.
Secret key agreement by public discussion from common information.
IEEE Trans Inf Theory,
1993, 39: 733-742
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Secret key agreement by public discussion from common information&author=Maurer U M&publication_year=1993&journal=IEEE Trans Inf Theory&volume=39&pages=733-742
[16]
Mathur S, Trappe W, Mandayam N, et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, San Francisco, 2008. 128-139.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Mathur S, Trappe W, Mandayam N, et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, San Francisco, 2008. 128-139&
[17]
Jana S, Premnath S N, Clark M, et al. On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of the 15th ACM international Conference on Mobile Computing and Networking, Beijing, 2009. 321-332.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Jana S, Premnath S N, Clark M, et al. On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of the 15th ACM international Conference on Mobile Computing and Networking, Beijing, 2009. 321-332&
[18]
Patwari
N,
Croft
J,
Jana
S, et al.
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements.
IEEE Trans Mobile Comput,
2010, 9: 17-30
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=High-rate uncorrelated bit extraction for shared secret key generation from channel measurements&author=Patwari N&author=Croft J&author=Jana S&publication_year=2010&journal=IEEE Trans Mobile Comput&volume=9&pages=17-30
[19]
Liu H, Yang J, Wang Y, et al. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In: Proceedings of the 31st IEEE International Conference on Computer Communications, Orlando, 2012. 927-935.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Liu H, Yang J, Wang Y, et al. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In: Proceedings of the 31st IEEE International Conference on Computer Communications, Orlando, 2012. 927-935&
[20]
Yasukawa S, Iwai H, Sasaoka H. Adaptive key generation in secret key agreement scheme based on the channel characteristics in OFDM. In: Proceedings of International Symposium on Information Theory and its Applications, Auckland, 2008. 1-6.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Yasukawa S, Iwai H, Sasaoka H. Adaptive key generation in secret key agreement scheme based on the channel characteristics in OFDM. In: Proceedings of International Symposium on Information Theory and its Applications, Auckland, 2008. 1-6&
[21]
Sayeed A, Perrig A. Secure wireless communications: secret keys through multipath. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, 2008. 3013-3016.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Sayeed A, Perrig A. Secure wireless communications: secret keys through multipath. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, 2008. 3013-3016&
[22]
Wang Q, Su H, Ren K, et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In: Proceedings of the 30th IEEE International Conference on Computer Communications, Shanghai, 2011. 1422-1430.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Wang Q, Su H, Ren K, et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In: Proceedings of the 30th IEEE International Conference on Computer Communications, Shanghai, 2011. 1422-1430&
[23]
Liu
Y,
Draper
S C,
Sayeed
A M.
Exploiting channel diversity in secret key generation from multipath fading randomness.
IEEE Trans Inf Foren Secur,
2012, 7: 1484-1497
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Exploiting channel diversity in secret key generation from multipath fading randomness&author=Liu Y&author=Draper S C&author=Sayeed A M&publication_year=2012&journal=IEEE Trans Inf Foren Secur&volume=7&pages=1484-1497
[24]
Chou T H, Draper S C, Sayeed A M. Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness. In: Proceedings of IEEE International Symposium on Information Theory, Austin, 2010. 2518--2522.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Chou T H, Draper S C, Sayeed A M. Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness. In: Proceedings of IEEE International Symposium on Information Theory, Austin, 2010. 2518--2522&
[25]
Studnia I, Alata E, Deswarte Y, et al. Survey of security problems in cloud computing virtual machines. In: Proceedings of Computer and Electronics Security Applications Rendez-vous, Rennes, 2012. 61-74.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Studnia I, Alata E, Deswarte Y, et al. Survey of security problems in cloud computing virtual machines. In: Proceedings of Computer and Electronics Security Applications Rendez-vous, Rennes, 2012. 61-74&
[26]
Ferrie P. Attacks on more virtual machine emulators. Symantec Advanced Threat Res, 2007. 1-17.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Ferrie P. Attacks on more virtual machine emulators. Symantec Advanced Threat Res, 2007. 1-17&
[27]
Ristenpart T, Tromer E, Shacham H, et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on Computer and communications security, Chicago, 2009. 199-212.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Ristenpart T, Tromer E, Shacham H, et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on Computer and communications security, Chicago, 2009. 199-212&
[28]
King S T, Chen P M. SubVirt: implementing malware with virtual machines. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, 2006. 1-14.
Google Scholar
http://scholar.google.com/scholar_lookup?title=King S T, Chen P M. SubVirt: implementing malware with virtual machines. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, 2006. 1-14&
[29]
Nance K, Bishop M, Hay B. Virtual machine introspection: observation or interference? IEEE Secur Priv, 2008, 5: 32-37.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Nance K, Bishop M, Hay B. Virtual machine introspection: observation or interference? IEEE Secur Priv, 2008, 5: 32-37&
[30]
Payne B D, Carbone M, Sharif M, et al. Lares: an architecture for secure active monitoring using virtualization. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, 2008. 233-247.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Payne B D, Carbone M, Sharif M, et al. Lares: an architecture for secure active monitoring using virtualization. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, 2008. 233-247&
[31]
Ibrahim A S, Hamlyn-Harris J, Grundy J, et al. CloudSec: a security monitoring appliance for Virtual Machines in the IaaS cloud model. In: Proceedings of the 5th International Conference on Network and System Security, Milan, 2011. 113-120.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Ibrahim A S, Hamlyn-Harris J, Grundy J, et al. CloudSec: a security monitoring appliance for Virtual Machines in the IaaS cloud model. In: Proceedings of the 5th International Conference on Network and System Security, Milan, 2011. 113-120&
[32]
Yao F, Sprabery R, Campbell R H. CryptVMI: a flexible and encrypted virtual machine introspection system in the cloud. In: Proceedings of the 2nd international workshop on Security in cloud computing, Kyoto, 2014. 11-18.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Yao F, Sprabery R, Campbell R H. CryptVMI: a flexible and encrypted virtual machine introspection system in the cloud. In: Proceedings of the 2nd international workshop on Security in cloud computing, Kyoto, 2014. 11-18&
[33]
Seshadri A, Luk M, Qu N, et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In: Proceedings of the 21st ACM SIGOPS symposium on Operating systems principles, Washington, 2007. 335-350.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Seshadri A, Luk M, Qu N, et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In: Proceedings of the 21st ACM SIGOPS symposium on Operating systems principles, Washington, 2007. 335-350&
[34]
Litty L, Lagar-Cavilla H A, Lie D. Hypervisor support for identifying covertly executing binaries. In: Proceedings of the 17th Conference on Security Symposium, Berkeley, 2008. 243-258.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Litty L, Lagar-Cavilla H A, Lie D. Hypervisor support for identifying covertly executing binaries. In: Proceedings of the 17th Conference on Security Symposium, Berkeley, 2008. 243-258&
[35]
Wang Y D, Yang J H, Xu C, et al. Survey on access control technologies for cloud computing. J Soft, 2015, 26: 1129-1150 [王于丁, 杨家海, 徐聪, 等. 云计算访问控制技术研究综述. 软件学报, 2015, 26: 1129-1150].
Google Scholar
http://scholar.google.com/scholar_lookup?title=Wang Y D, Yang J H, Xu C, et al. Survey on access control technologies for cloud computing. J Soft, 2015, 26: 1129-1150 [王于丁, 杨家海, 徐聪, 等. 云计算访问控制技术研究综述. 软件学报, 2015, 26: 1129-1150]&
[36]
Li X Y, Shi Y, Guo Y, et al. Multi-tenancy based access control in cloud. In: Proceedings of International Conference on Computational Intelligence and Software Engineering, Wuhan, 2010. 1-4.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Li X Y, Shi Y, Guo Y, et al. Multi-tenancy based access control in cloud. In: Proceedings of International Conference on Computational Intelligence and Software Engineering, Wuhan, 2010. 1-4&
[37]
Tang
B,
Sandhu
R,
Li
Q.
Multi-tenancy authorization models for collaborative cloud services.
Concurr Comput Pract Exper,
2015, 27: 2851-2868
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Multi-tenancy authorization models for collaborative cloud services&author=Tang B&author=Sandhu R&author=Li Q&publication_year=2015&journal=Concurr Comput Pract Exper&volume=27&pages=2851-2868
[38]
Kurmus A, Gupta M, Pletka R, et al. A comparison of secure multi-tenancy architectures for filesystem storage clouds. In: Proceedings of the 12th International Middleware Conference, Laxenburg, 2011. 460-479.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Kurmus A, Gupta M, Pletka R, et al. A comparison of secure multi-tenancy architectures for filesystem storage clouds. In: Proceedings of the 12th International Middleware Conference, Laxenburg, 2011. 460-479&
[39]
Popa L, Yu M, Ko S Y, et al. CloudPolice: taking access control out of the network. In: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, Monterey, 2010, 7. 1-6.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Popa L, Yu M, Ko S Y, et al. CloudPolice: taking access control out of the network. In: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, Monterey, 2010, 7. 1-6&
[40]
Azab A M, Ning P, Wang Z, et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, 2010. 38-49.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Azab A M, Ning P, Wang Z, et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, 2010. 38-49&
[41]
Wang Z, Jiang X. Hypersafe: a lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, 2010. 380-395.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Wang Z, Jiang X. Hypersafe: a lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, 2010. 380-395&
[42]
Zhang F, Chen J, Chen H, et al. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In: Proceedings of the 23rd ACM Symposium on Operating Systems Principles, Cascais, 2011. 203-216.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Zhang F, Chen J, Chen H, et al. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In: Proceedings of the 23rd ACM Symposium on Operating Systems Principles, Cascais, 2011. 203-216&
[43]
Heiser G, Uhlig V, LeVasseur J. Are virtual-machine monitors microkernels done right? ACM SIGOPS Operating Syst Rev, 2006, 40: 95-99.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Heiser G, Uhlig V, LeVasseur J. Are virtual-machine monitors microkernels done right? ACM SIGOPS Operating Syst Rev, 2006, 40: 95-99&
[44]
Klein G, Elphinstone K, Heiser G, et al. seL4: formal verification of an OS kernel. In: Proceedings of the 22nd ACM SIGOPS Symposium on Operating Systems Principles, Big Sky, 2009. 207-220.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Klein G, Elphinstone K, Heiser G, et al. seL4: formal verification of an OS kernel. In: Proceedings of the 22nd ACM SIGOPS Symposium on Operating Systems Principles, Big Sky, 2009. 207-220&
[45]
Azab A M, Swidowski K, Bhutkar J M, et al. SKEE: a lightweight secure kernel-level execution environment for ARM. In: Proceedings of Network and Distributed System Security Symposium, San Diego, 2016. 1-15.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Azab A M, Swidowski K, Bhutkar J M, et al. SKEE: a lightweight secure kernel-level execution environment for ARM. In: Proceedings of Network and Distributed System Security Symposium, San Diego, 2016. 1-15&
[46]
Suh E, Ferraiuolo A, Wang Y, et al. Full-Processor Timing Channel Protection with Applications to Secure Hardware Compartments. Computing and Information Science Technical Reports, 2015. 1-15.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Suh E, Ferraiuolo A, Wang Y, et al. Full-Processor Timing Channel Protection with Applications to Secure Hardware Compartments. Computing and Information Science Technical Reports, 2015. 1-15&
[47]
Xia Y, Liu Y, Guan H, et al. Secure outsourcing of virtual appliance. IEEE Trans Cloud Comput, 2015, 99: 1-15.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Xia Y, Liu Y, Guan H, et al. Secure outsourcing of virtual appliance. IEEE Trans Cloud Comput, 2015, 99: 1-15&
[48]
Ling Z, Luo J, Chen Q, et al. Secure fingertip mouse for mobile devices. In: Proceedings of the 35th Annual IEEE International Conference on Computer Communications, San Francisco, 2016. 1-9.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Ling Z, Luo J, Chen Q, et al. Secure fingertip mouse for mobile devices. In: Proceedings of the 35th Annual IEEE International Conference on Computer Communications, San Francisco, 2016. 1-9&
[49]
Aviv A J, Gibson K, Mossop E, et al. Smudge attacks on smartphone touch screens. In: Proceedings of the 4th USENIX Workshop on Offensive Technologies, Washington, 2010. 1-10.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Aviv A J, Gibson K, Mossop E, et al. Smudge attacks on smartphone touch screens. In: Proceedings of the 4th USENIX Workshop on Offensive Technologies, Washington, 2010. 1-10&
[50]
Gao H, Ren Z, Chang X, et al. A new graphical password scheme resistant to shoulder-surfing. In: Proceedings of the International Conference on Cyberworlds, Singapore, 2010. 194-199.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Gao H, Ren Z, Chang X, et al. A new graphical password scheme resistant to shoulder-surfing. In: Proceedings of the International Conference on Cyberworlds, Singapore, 2010. 194-199&
[51]
Kwon
T,
Na
S.
TinyLock: affordable defense against smudge attacks on smartphone pattern lock systems.
Comput Secur,
2014, 42: 137-150
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=TinyLock: affordable defense against smudge attacks on smartphone pattern lock systems&author=Kwon T&author=Na S&publication_year=2014&journal=Comput Secur&volume=42&pages=137-150
[52]
Bojinov H, Boneh D. Mobile token-based authentication on a budget. In: Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, Phoenix, 2011. 14-19.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Bojinov H, Boneh D. Mobile token-based authentication on a budget. In: Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, Phoenix, 2011. 14-19&
[53]
Chen S, Pande A, Mohapatra P. Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones. In: Proceedings of the 12th International Conference on Mobile Systems, Applications, and Services, Bretton Woods, 2014. 109-122.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Chen S, Pande A, Mohapatra P. Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones. In: Proceedings of the 12th International Conference on Mobile Systems, Applications, and Services, Bretton Woods, 2014. 109-122&
[54]
Cheng K Y, Kumar A. Contactless finger knuckle identification using smartphones. In: Proceedings of the International Conference of the Biometrics Special Interest Group, Darmstadt, 2012. 1-6.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Cheng K Y, Kumar A. Contactless finger knuckle identification using smartphones. In: Proceedings of the International Conference of the Biometrics Special Interest Group, Darmstadt, 2012. 1-6&
[55]
Shabrina N, Akbar S, Ruswono P. Palmprint authentication in smartphone using phase-only correlation method. In: Proceedings of the 5th International Conference on Advanced Computer Science and Information Systems, Bali, 2013. 397-402.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Shabrina N, Akbar S, Ruswono P. Palmprint authentication in smartphone using phase-only correlation method. In: Proceedings of the 5th International Conference on Advanced Computer Science and Information Systems, Bali, 2013. 397-402&
[56]
Raja K B, Raghavendra R, Stokkenes M, et al. Smartphone authentication system using periocular biometrics. In: Proceedings of the International Conference of the Biometrics Special Interest Group, Darmstadt, 2014. 1-8.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Raja K B, Raghavendra R, Stokkenes M, et al. Smartphone authentication system using periocular biometrics. In: Proceedings of the International Conference of the Biometrics Special Interest Group, Darmstadt, 2014. 1-8&
[57]
de Luca A, Hang A, Brudy F, et al. Touch me once and I know it's you! implicit authentication based on touch screen patterns. In: Proceedings of the 30th ACM Conference on Human Factors in Computing Systems, Austin, 2012. 987-996.
Google Scholar
http://scholar.google.com/scholar_lookup?title=de Luca A, Hang A, Brudy F, et al. Touch me once and I know it's you! implicit authentication based on touch screen patterns. In: Proceedings of the 30th ACM Conference on Human Factors in Computing Systems, Austin, 2012. 987-996&
[58]
Clarke N L, Furnell S M. Authenticating mobile phone users using keystroke analysis. Int J Inf Secur, 2007, 6: 1-14.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Clarke N L, Furnell S M. Authenticating mobile phone users using keystroke analysis. Int J Inf Secur, 2007, 6: 1-14&
[59]
Giuffrida C, Majdanik K, Conti M, et al. I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics. In: Detection of Intrusions and Malware, and Vulnerability Assessment. Berlin: Springer, 2014. 92-111.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Giuffrida C, Majdanik K, Conti M, et al. I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics. In: Detection of Intrusions and Malware, and Vulnerability Assessment. Berlin: Springer, 2014. 92-111&
[60]
Burgbacher U, Hinrichs K. An implicit author verification system for text messages based on gesture typing biometrics. In: Proceedings of the 32nd ACM Conference on Human Factors in Computing Systems, Toronto, 2014. 2951-2954.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Burgbacher U, Hinrichs K. An implicit author verification system for text messages based on gesture typing biometrics. In: Proceedings of the 32nd ACM Conference on Human Factors in Computing Systems, Toronto, 2014. 2951-2954&
[61]
Derawi M O, Nickel C, Bours P, et al. Unobtrusive user-authentication on mobile phones using biometric gait recognition. In: Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, 2010. 306-311.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Derawi M O, Nickel C, Bours P, et al. Unobtrusive user-authentication on mobile phones using biometric gait recognition. In: Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, 2010. 306-311&
[62]
Feng T, Liu Z, Kwon K A, et al. Continuous mobile authentication using touchscreen gestures. In: Proceedings of the IEEE Conference on Technologies for Homeland Security, Waltham, 2012. 451-456.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Feng T, Liu Z, Kwon K A, et al. Continuous mobile authentication using touchscreen gestures. In: Proceedings of the IEEE Conference on Technologies for Homeland Security, Waltham, 2012. 451-456&
[63]
Frank
M,
Biedert
R,
Ma
E D, et al.
Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication.
IEEE Trans Inf Foren Secur,
2013, 8: 136-148
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication&author=Frank M&author=Biedert R&author=Ma E D&publication_year=2013&journal=IEEE Trans Inf Foren Secur&volume=8&pages=136-148
[64]
Shen C, Zhang Y, Cai Z, et al. Touch-interaction behavior for continuous user authentication on smartphones. In: Proceedings of the 8th International Conference on Biometrics, Phuket, 2015. 157-162.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Shen C, Zhang Y, Cai Z, et al. Touch-interaction behavior for continuous user authentication on smartphones. In: Proceedings of the 8th International Conference on Biometrics, Phuket, 2015. 157-162&
[65]
Jakobsson M, Shi E, Golle P, et al. Implicit authentication for mobile devices. In: Proceedings of the 4th USENIX Workshop on Hot Topics in Security, Montreal, 2009. 9-14.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Jakobsson M, Shi E, Golle P, et al. Implicit authentication for mobile devices. In: Proceedings of the 4th USENIX Workshop on Hot Topics in Security, Montreal, 2009. 9-14&
[66]
Conti M, Zachia-Zlatea I, Crispo B. Mind how you answer me! In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, 2011. 249-259.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Conti M, Zachia-Zlatea I, Crispo B. Mind how you answer me! In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, 2011. 249-259&
[67]
McLaughlin S, Podkuiko D, McDaniel P. Energy theft in the advanced metering infrastructure. Crit Inf Infrastructures Secur, 2009, 6027: 176-187.
Google Scholar
http://scholar.google.com/scholar_lookup?title=McLaughlin S, Podkuiko D, McDaniel P. Energy theft in the advanced metering infrastructure. Crit Inf Infrastructures Secur, 2009, 6027: 176-187&
[68]
Varodayan D P, Gao G X. Redundant metering for integrity with information-theoretic confidentiality. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 345-349.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Varodayan D P, Gao G X. Redundant metering for integrity with information-theoretic confidentiality. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 345-349&
[69]
Liu
N,
Chen
J,
Zhu
L, et al.
A key management scheme for secure communications of advanced metering infrastructure in smart grid.
IEEE Trans Ind Electron,
2013, 60: 4746-4756
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=A key management scheme for secure communications of advanced metering infrastructure in smart grid&author=Liu N&author=Chen J&author=Zhu L&publication_year=2013&journal=IEEE Trans Ind Electron&volume=60&pages=4746-4756
[70]
Diao F, Zhang F, Cheng X. A privacy-preserving smart metering scheme using linkable anonymous credential. IEEE Trans Ind Electron, 2015, 6: 461-467.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Diao F, Zhang F, Cheng X. A privacy-preserving smart metering scheme using linkable anonymous credential. IEEE Trans Ind Electron, 2015, 6: 461-467&
[71]
Li F, Luo B, Liu P. Secure information aggregation for smart grids using homomorphic encryption. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 327-332.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Li F, Luo B, Liu P. Secure information aggregation for smart grids using homomorphic encryption. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 327-332&
[72]
Li H, Mao R, Lai L, et al. Compressed meter reading for delay-sensitive and secure load report in smart grid. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 114-119.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Li H, Mao R, Lai L, et al. Compressed meter reading for delay-sensitive and secure load report in smart grid. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 114-119&
[73]
Rial A, Danezis G. Privacy-preserving smart metering. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, Chicago, 2011. 49-60.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Rial A, Danezis G. Privacy-preserving smart metering. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, Chicago, 2011. 49-60&
[74]
Ruj S, Nayak A. A decentralized security framework for data aggregation and access control in smart grids. IEEE Trans Ind Electron, 2013, 4: 196-205.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Ruj S, Nayak A. A decentralized security framework for data aggregation and access control in smart grids. IEEE Trans Ind Electron, 2013, 4: 196-205&
[75]
Rottondi
C,
Verticale
G,
Capone
A.
Privacy-preserving smart metering with multiple data consumers.
Comput Netw,
2013, 57: 1699-1713
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Privacy-preserving smart metering with multiple data consumers&author=Rottondi C&author=Verticale G&author=Capone A&publication_year=2013&journal=Comput Netw&volume=57&pages=1699-1713
[76]
Birman
K,
Jelasity
M,
Kleinberg
R, et al.
Building a secure and privacy-preserving smart grid.
ACM Special Interest Group Operating Syst Rev,
2015, 49: 131-136
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Building a secure and privacy-preserving smart grid&author=Birman K&author=Jelasity M&author=Kleinberg R&publication_year=2015&journal=ACM Special Interest Group Operating Syst Rev&volume=49&pages=131-136
[77]
Yuan
Y,
Li
Z,
Ren
K.
Modeling load redistribution attacks in power systems.
IEEE Trans Smart Grid,
2011, 2: 382-390
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Modeling load redistribution attacks in power systems&author=Yuan Y&author=Li Z&author=Ren K&publication_year=2011&journal=IEEE Trans Smart Grid&volume=2&pages=382-390
[78]
Liu Y, Ning P, Reiter M K. False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur, 2011, 14: 1-33.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Liu Y, Ning P, Reiter M K. False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur, 2011, 14: 1-33&
[79]
Huang Y, Esmalifalak M, Nguyen H, et al. Bad data injection in smart grid: attack and defense mechanisms. IEEE Commun Mag, 2013, 51: 27-33.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Huang Y, Esmalifalak M, Nguyen H, et al. Bad data injection in smart grid: attack and defense mechanisms. IEEE Commun Mag, 2013, 51: 27-33&
[80]
Yu
Z H,
Chin
W L.
Blind false data injection attack using pca approximation method in smart grid.
IEEE Trans Smart Grid,
2015, 6: 1219-1226
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Blind false data injection attack using pca approximation method in smart grid&author=Yu Z H&author=Chin W L&publication_year=2015&journal=IEEE Trans Smart Grid&volume=6&pages=1219-1226
[81]
Bobba R B, Rogers K M, Wang Q, et al. Detecting false data injection attacks on dc state estimation. In: Proceedings of the 1st Workshop on Secure Control Systems, Stockholm, 2010. 1-9.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Bobba R B, Rogers K M, Wang Q, et al. Detecting false data injection attacks on dc state estimation. In: Proceedings of the 1st Workshop on Secure Control Systems, Stockholm, 2010. 1-9&
[82]
Dán G, Sandberg H. Stealth attacks and protection schemes for state estimators in power systems. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 214-219.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Dán G, Sandberg H. Stealth attacks and protection schemes for state estimators in power systems. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 214-219&
[83]
Liu
L,
Esmalifalak
M,
Ding
Q, et al.
Detecting false data injection attacks on power grid by sparse optimization.
IEEE Trans Smart Grid,
2014, 5: 612-621
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Detecting false data injection attacks on power grid by sparse optimization&author=Liu L&author=Esmalifalak M&author=Ding Q&publication_year=2014&journal=IEEE Trans Smart Grid&volume=5&pages=612-621
[84]
Lu Z, Lu X, Wang W, et al. Review and evaluation of security threats on the communication networks in the smart grid. In: Proceedings of IEEE Military Communications Conference, San Jose, 2010. 1830-1835.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Lu Z, Lu X, Wang W, et al. Review and evaluation of security threats on the communication networks in the smart grid. In: Proceedings of IEEE Military Communications Conference, San Jose, 2010. 1830-1835&
[85]
Li H, Lai L, Qiu R C. Communication capacity requirement for reliable and secure state estimation in smart grid. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 191-196.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Li H, Lai L, Qiu R C. Communication capacity requirement for reliable and secure state estimation in smart grid. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 191-196&
[86]
Khurana H, Bobba R, Yardley T, et al. Design principles for power grid cyber-infrastructure authentication protocols. In: Proceedings of the 43rd Hawaii International Conference on System Sciences, Hawaii, 2010. 1-10.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Khurana H, Bobba R, Yardley T, et al. Design principles for power grid cyber-infrastructure authentication protocols. In: Proceedings of the 43rd Hawaii International Conference on System Sciences, Hawaii, 2010. 1-10&
[87]
Yang M, Luo J, Ling Z, et al. De-anonymizing and countermeasures in anonymous communication networks. IEEE Commun Mag, 2015, 53: 60-66.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Yang M, Luo J, Ling Z, et al. De-anonymizing and countermeasures in anonymous communication networks. IEEE Commun Mag, 2015, 53: 60-66&
[88]
Edman M, Syverson P. AS-awareness in tor path selection. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, 2009. 380-389.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Edman M, Syverson P. AS-awareness in tor path selection. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, 2009. 380-389&
[89]
Murdoch S J, Zieliński P. Sampled traffic analysis by internet-exchange-level adversaries. In: Proceedings of the Privacy Enhancing Technologies, Berlin, 2007. 167-183.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Murdoch S J, Zieliński P. Sampled traffic analysis by internet-exchange-level adversaries. In: Proceedings of the Privacy Enhancing Technologies, Berlin, 2007. 167-183&
[90]
Johnson A, Wacek C, Jansen R, et al. Users get routed: traffic correlation on tor by realistic adversaries. In: Proceedings of the 20th ACM Conference on Computer and Communications Security, Berlin, 2013. 337-348.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Johnson A, Wacek C, Jansen R, et al. Users get routed: traffic correlation on tor by realistic adversaries. In: Proceedings of the 20th ACM Conference on Computer and Communications Security, Berlin, 2013. 337-348&
[91]
Bauer K, McCoy D, Grunwald D, et al. Low-resource routing attacks against Tor. In: Proceedings of the ACM Workshop on Privacy in the Electronic Society, Alexandria, 2007. 11-20.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Bauer K, McCoy D, Grunwald D, et al. Low-resource routing attacks against Tor. In: Proceedings of the ACM Workshop on Privacy in the Electronic Society, Alexandria, 2007. 11-20&
[92]
Pappas V, Athanasopoulos E, Ioannidis S, et al. Compromising anonymity using packet spinning. In: Proceedings of the 11th Information Security Conference, Taipei, 2008. 161-174.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Pappas V, Athanasopoulos E, Ioannidis S, et al. Compromising anonymity using packet spinning. In: Proceedings of the 11th Information Security Conference, Taipei, 2008. 161-174&
[93]
Yu W, Fu X, Graham S, et al. DSSS-based flow marking technique for invisible traceback. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, 2007. 18-32.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Yu W, Fu X, Graham S, et al. DSSS-based flow marking technique for invisible traceback. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, 2007. 18-32&
[94]
Houmansadr A, Kiyavash N, Borisov N. RAINBOW: a robust and invisible non-blind watermark for network flows. In: Proceedings of the 16th Annual Network {&} Distributed System Security Symposium, San Diego, 2009. 1-13.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Houmansadr A, Kiyavash N, Borisov N. RAINBOW: a robust and invisible non-blind watermark for network flows. In: Proceedings of the 16th Annual Network {&} Distributed System Security Symposium, San Diego, 2009. 1-13&
[95]
Wang X, Luo J, Yang M. An interval centroid based spread spectrum watermark for tracing multiple network flows. In: Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, San Antonio, 2009. 4000-4006.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Wang X, Luo J, Yang M. An interval centroid based spread spectrum watermark for tracing multiple network flows. In: Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, San Antonio, 2009. 4000-4006&
[96]
Ling Z, Luo J, Yu W, et al. A new cell counter based attack against tor. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, 2009. 578-589.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Ling Z, Luo J, Yu W, et al. A new cell counter based attack against tor. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, 2009. 578-589&
[97]
Ling
Z,
Luo
J,
Yu
W, et al.
Protocol-level attacks against tor.
Comput Netw,
2013, 57: 869-886
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Protocol-level attacks against tor&author=Ling Z&author=Luo J&author=Yu W&publication_year=2013&journal=Comput Netw&volume=57&pages=869-886
[98]
Ling
Z,
Fu
X,
Jia
W, et al.
Novel packet size-based covert channel attacks against anonymizer.
IEEE Trans Comput,
2013, 62: 2411-2426
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Novel packet size-based covert channel attacks against anonymizer&author=Ling Z&author=Fu X&author=Jia W&publication_year=2013&journal=IEEE Trans Comput&volume=62&pages=2411-2426
[99]
Wang
X,
Luo
J,
Yang
M, et al.
A potential HTTP-based application-level attack against tor.
Future Gener Comput Syst,
2011, 27: 67-77
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=A potential HTTP-based application-level attack against tor&author=Wang X&author=Luo J&author=Yang M&publication_year=2011&journal=Future Gener Comput Syst&volume=27&pages=67-77
[100]
Chakravarty S, Barbera M V, Portokalidis G, et al. On the effectiveness of traffic analysis against anonymity networks using flow records. In: Proceedings of Passive and Active Measurement Conference, Los Angeles, 2014. 247-257.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Chakravarty S, Barbera M V, Portokalidis G, et al. On the effectiveness of traffic analysis against anonymity networks using flow records. In: Proceedings of Passive and Active Measurement Conference, Los Angeles, 2014. 247-257&
[101]
Hintz A. Fingerprinting websites using traffic analysis. In: Proceedings of the 2nd International Conference on Privacy Enhancing Technologies, San Francisco, 2002. 171-178.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Hintz A. Fingerprinting websites using traffic analysis. In: Proceedings of the 2nd International Conference on Privacy Enhancing Technologies, San Francisco, 2002. 171-178&
[102]
Liberatore M, Levine B N. Inferring the source of encrypted HTTP connections. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, 2006. 255-263.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Liberatore M, Levine B N. Inferring the source of encrypted HTTP connections. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, 2006. 255-263&
[103]
Panchenko A, Niessen L, Zinnen A, et al. Website fingerprinting in onion routing based anonymization networks. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, New York, 2011. 103-114.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Panchenko A, Niessen L, Zinnen A, et al. Website fingerprinting in onion routing based anonymization networks. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, New York, 2011. 103-114&
[104]
Cai X, Zhang X C, Joshi B, et al. Touching from a distance: website fingerprinting attacks and defenses. In: Proceedings of the ACM Conference on Computer and Communications Security, New York, 2012. 605-616.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Cai X, Zhang X C, Joshi B, et al. Touching from a distance: website fingerprinting attacks and defenses. In: Proceedings of the ACM Conference on Computer and Communications Security, New York, 2012. 605-616&
[105]
Wang T, Cai X, Nithyanand R, et al. Effective attacks and provable defenses for website fingerprinting. In: Proceedings of the 23rd USENIX Security Symposium, San Diego, 2014. 143-157.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Wang T, Cai X, Nithyanand R, et al. Effective attacks and provable defenses for website fingerprinting. In: Proceedings of the 23rd USENIX Security Symposium, San Diego, 2014. 143-157&
[106]
He G, Yang M, Gu X, et al. A novel active website fingerprinting attack against tor anonymous system. In: Proceedings of the 18th IEEE International Conference on Computer Supported Cooperative Work in Design, Hsinchu, 2014. 112-117.
Google Scholar
http://scholar.google.com/scholar_lookup?title=He G, Yang M, Gu X, et al. A novel active website fingerprinting attack against tor anonymous system. In: Proceedings of the 18th IEEE International Conference on Computer Supported Cooperative Work in Design, Hsinchu, 2014. 112-117&
[107]
Bennett C H, Brassard G. Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computer System and Signal Processing, New York, 1984. 175-179.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Bennett C H, Brassard G. Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computer System and Signal Processing, New York, 1984. 175-179&
[108]
Lo
H K,
Chau
H F.
Unconditional security of quantum key distribution over arbitrarily long distances.
Science,
1999, 283: 2050-2056
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Unconditional security of quantum key distribution over arbitrarily long distances&author=Lo H K&author=Chau H F&publication_year=1999&journal=Science&volume=283&pages=2050-2056
[109]
Ekert
A K.
Quantum cryptography based on Bell's theorem.
Phys Rev Lett,
1991, 67: 661-663
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum cryptography based on Bell's theorem&author=Ekert A K&publication_year=1991&journal=Phys Rev Lett&volume=67&pages=661-663
[110]
Bennett
C H.
Quantum cryptography using any two nonorthogonal states.
Phys Rev Lett,
1992, 68: 3121-3124
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum cryptography using any two nonorthogonal states&author=Bennett C H&publication_year=1992&journal=Phys Rev Lett&volume=68&pages=3121-3124
[111]
Peng C Z, Yang T, Bao X H, et al. Experimental free-space distribution of entangled photon pairs over 13 km: towards satellite-based global quantum communication. Phys Rev Lett, 2005, 94: 1-4.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Peng C Z, Yang T, Bao X H, et al. Experimental free-space distribution of entangled photon pairs over 13 km: towards satellite-based global quantum communication. Phys Rev Lett, 2005, 94: 1-4&
[112]
Peng C Z, Zhang J, Yang D, et al. Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Phys Rev Lett, 2007, 98: 1-4.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Peng C Z, Zhang J, Yang D, et al. Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Phys Rev Lett, 2007, 98: 1-4&
[113]
Jin
X M,
Ren
J G.
Experimental free-space quantum teleportation.
Nature Photon,
2010, 4: 376-381
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Experimental free-space quantum teleportation&author=Jin X M&author=Ren J G&publication_year=2010&journal=Nature Photon&volume=4&pages=376-381
[114]
Hoffstein J, Pipher J, Silverman J H. NTRU: a ring-based public key cryptosystem. In: Proceedings of the 3rd International Symposium on Algorithmic Number Theory, Portland, 1998. 267-288.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Hoffstein J, Pipher J, Silverman J H. NTRU: a ring-based public key cryptosystem. In: Proceedings of the 3rd International Symposium on Algorithmic Number Theory, Portland, 1998. 267-288&
[115]
Regev O. On lattices, learning with errors, random linear codes, and cryptography. J ACM, 2009, 56: 34-73.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Regev O. On lattices, learning with errors, random linear codes, and cryptography. J ACM, 2009, 56: 34-73&
[116]
Gentry C. Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st ACM Symposium on Theory of Computing, Bethesda, 2009. 169-178.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Gentry C. Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st ACM Symposium on Theory of Computing, Bethesda, 2009. 169-178&
[117]
Agrawal S, Boneh D, Boyen X. Efficient lattice (H) IBE in the standard model. In: Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Riviera, 2010. 553-572.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Agrawal S, Boneh D, Boyen X. Efficient lattice (H) IBE in the standard model. In: Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Riviera, 2010. 553-572&
[118]
Lyubashevsky V. Lattice signatures without trapdoors. In: Proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, 2012. 738-755.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Lyubashevsky V. Lattice signatures without trapdoors. In: Proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, 2012. 738-755&
[119]
Adleman
L M.
Molecular computation of solutions to combinatorial problems.
Science,
1994, 266: 1021-1024
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Molecular computation of solutions to combinatorial problems&author=Adleman L M&publication_year=1994&journal=Science&volume=266&pages=1021-1024
[120]
Tang J, Cui Y, Li Q, et al. Ensuring security and privacy preservation for cloud data services. ACM Comput Surv, 2016, 49: 1-39.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Tang J, Cui Y, Li Q, et al. Ensuring security and privacy preservation for cloud data services. ACM Comput Surv, 2016, 49: 1-39&
[121]
Rivest R L, Adleman L, Dertouzos M L. On data banks and privacy homomorphisms. Found Secure Comput, 1978, 4: 169-180.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Rivest R L, Adleman L, Dertouzos M L. On data banks and privacy homomorphisms. Found Secure Comput, 1978, 4: 169-180&
[122]
van Dijk M, Gentry C, Halevi S, et al. Fully homomorphic encryption over the integers. In: Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Riviera, 2010. 24-43.
Google Scholar
http://scholar.google.com/scholar_lookup?title=van Dijk M, Gentry C, Halevi S, et al. Fully homomorphic encryption over the integers. In: Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Riviera, 2010. 24-43&
[123]
Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy, Berkeley, 2000. 44-55.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy, Berkeley, 2000. 44-55&
[124]
Boneh D, Di Crescenzo G, Ostrovsky R, et al. Public key encryption with keyword search. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, 2004. 506-522.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Boneh D, Di Crescenzo G, Ostrovsky R, et al. Public key encryption with keyword search. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, 2004. 506-522&
[125]
Cao
N,
Wang
C,
Li
M, et al.
Privacy-preserving multi-keyword ranked search over encrypted cloud data.
IEEE Trans Parall Distrib Syst,
2014, 25: 222-233
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Privacy-preserving multi-keyword ranked search over encrypted cloud data&author=Cao N&author=Wang C&author=Li M&publication_year=2014&journal=IEEE Trans Parall Distrib Syst&volume=25&pages=222-233
[126]
Sahai A, Waters B. Fuzzy identity-based encryption. In: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, 2005. 457-473.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Sahai A, Waters B. Fuzzy identity-based encryption. In: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, 2005. 457-473&
[127]
Lewko A, Okamoto T, Sahai A, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Riviera, 2010. 62-91.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Lewko A, Okamoto T, Sahai A, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Riviera, 2010. 62-91&
[128]
O'Neill A. Definitional issues in functional encryption. IACR Cryptology ePrint Archive, 2010. 1-11.
Google Scholar
http://scholar.google.com/scholar_lookup?title=O'Neill A. Definitional issues in functional encryption. IACR Cryptology ePrint Archive, 2010. 1-11&
[129]
Boneh
D,
Sahai
A,
Waters
B.
Functional encryption: definitions and challenges.
Theory Cryptogr,
2011, 6597: 253-273
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Functional encryption: definitions and challenges&author=Boneh D&author=Sahai A&author=Waters B&publication_year=2011&journal=Theory Cryptogr&volume=6597&pages=253-273
[130]
Naveed M, Agrawal S, Prabhakaran M, et al. Controlled functional encryption. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Arizona, 2014. 1280-1291.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Naveed M, Agrawal S, Prabhakaran M, et al. Controlled functional encryption. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Arizona, 2014. 1280-1291&
[131]
David M, Ranasinghe D C, Larsen T. A2U2: a stream cipher for printed electronics RFID tags. In: Proceedings of IEEE International Conference on RFID, Orlando, 2011. 176-183.
Google Scholar
http://scholar.google.com/scholar_lookup?title=David M, Ranasinghe D C, Larsen T. A2U2: a stream cipher for printed electronics RFID tags. In: Proceedings of IEEE International Conference on RFID, Orlando, 2011. 176-183&
[132]
Saarinen M J O. The BlueJay ultra-lightweight hybrid cryptosystem. In: Proceedings of IEEE Symposium on Security and Privacy Workshops, San Francisco, 2012. 27-32.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Saarinen M J O. The BlueJay ultra-lightweight hybrid cryptosystem. In: Proceedings of IEEE Symposium on Security and Privacy Workshops, San Francisco, 2012. 27-32&
[133]
Gong Z. Survey on lightweight hash functions. J Cryptologic Res, 2016, 3: 1-11 [龚征. 轻量级Hash函数研究. 密码学报, 2016, 3: 1-11].
Google Scholar
http://scholar.google.com/scholar_lookup?title=Gong Z. Survey on lightweight hash functions. J Cryptologic Res, 2016, 3: 1-11 [龚征. 轻量级Hash函数研究. 密码学报, 2016, 3: 1-11]&
[134]
Bogdanov A, Kne\v{z}evi$\acute{\rm c}$ M, Leander G, et al. SPONGENT: a lightweight hash function. In: Proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, Nara, 2011. 312-325.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Bogdanov A, Kne\v{z}evi$\acute{\rm c}$ M, Leander G, et al. SPONGENT: a lightweight hash function. In: Proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, Nara, 2011. 312-325&
[135]
Yoshida H, Watanabe D, Okeya K, et al. MAME: a compression function with reduced hardware requirements. In: Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, 2007. 148-165.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Yoshida H, Watanabe D, Okeya K, et al. MAME: a compression function with reduced hardware requirements. In: Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, 2007. 148-165&
[136]
Hirose S, Ideguchi K, Kuwakado H, et al. A lightweight 256-bit hash function for hardware and low-end devices: lesamnta-LW. In: Proceedings of the 13th International Conference on Information Security and Cryptology, Seoul, 2010. 151-168.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Hirose S, Ideguchi K, Kuwakado H, et al. A lightweight 256-bit hash function for hardware and low-end devices: lesamnta-LW. In: Proceedings of the 13th International Conference on Information Security and Cryptology, Seoul, 2010. 151-168&
[137]
Kuwakado H, Hirose S. Hashing mode using a lightweight blockcipher. In: Proceedings of the 14th IMA International Conference on Cryptography and Coding, Oxford, 2013. 213-231.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Kuwakado H, Hirose S. Hashing mode using a lightweight blockcipher. In: Proceedings of the 14th IMA International Conference on Cryptography and Coding, Oxford, 2013. 213-231&
[138]
Billet O, Robshaw M J B, Peyrin T. On building hash functions from multivariate quadratic equations. In: Proceedings of the 12th Australasian Conference Information Security and Privacy, Townsville, 2007. 82-95.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Billet O, Robshaw M J B, Peyrin T. On building hash functions from multivariate quadratic equations. In: Proceedings of the 12th Australasian Conference Information Security and Privacy, Townsville, 2007. 82-95&
[139]
Bettale L, Faugere J C, Perret L. Security analysis of multivariate polynomials for hashing. In: Proceedings of the 11th International Conference Information Security and Cryptology, Seoul, 2008. 115-124.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Bettale L, Faugere J C, Perret L. Security analysis of multivariate polynomials for hashing. In: Proceedings of the 11th International Conference Information Security and Cryptology, Seoul, 2008. 115-124&