[1] |
PISA C , CAPONI A , DARGAHI T ,et al. WI-FAB:attribute-based WLAN access control,without pre-shared keys and backend infra-structures[C]// Proceedings of the 8th ACM International Work shop on Hot Topics in Planet-Scale Mobile Computing and Online Social Networking. 2016: 31-36.
|
[2] |
CASSOLA A , BLASS E O , NOUBIR G . Authenticating privately over public Wi-Fi hotspots[C]// Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015: 1346-1357.
|
[3] |
LOU W , REN K . Security,privacy,and accountability in wireless access networks[J]. IEEE Wireless Communications, 2009,16(4): 80-87.
|
[4] |
TSANG P P , AU M H , KAPADIA A ,et al. Blacklistable anonymous credentials:blocking misbehaving users without TTPS[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. 2007: 72-81.
|
[5] |
TSANG P P , AU M H , KAPADIA A ,et al. PEREA:Towards practical TTP-free revocation in anonymous authentication[C]// Proceedings of the 15th ACM Conference on Computer and Communications Security. 2008: 333-344.
|
[6] |
NIU Y , WEI L , ZHANG C ,et al. An anonymous and accountable authentication scheme for Wi-Fi hotspot access with the bitcoin blockchain[C]// 2017 IEEE/CIC International Conference on Communications in China (ICCC). 2017: 1-6.
|
[7] |
RUFFING T , MORENO-SANCHEZ P , KATE A . CoinShuffle:practical decentralized coin mixing for bitcoin[C]// European Symposium on Research in Computer Security. 2014: 345-364.
|
[8] |
MARTIN J , MAYBERRY T , DONAHUE C ,et al. A study of MAC address randomization in mobile devices and when it fails[J]. Proceedings on Privacy Enhancing Technologies, 2017,2017(4): 365-383.
|
[9] |
DINGLEDINE R , MATHEWSON N , SYVERSON P . Tor:the second-generation onion router[R]. Naval Research Lab Washington DC, 2004.
|
[10] |
BRASSER F , MüLLER U , DMITRIENKO A ,et al. Software grand exposure:SGX cache attacks are practical[C]// 11th USENIX Workshop on Offensive Technologies (WOOT 17). 2017.
|
[11] |
H?HNEL M , CUI W , PEINADO M . High-resolution side channels for untrusted operating systems[C]// 2017 USENIX Annual Technical Conference (USENIX ATC 17). 2017: 299-312.
|
[12] |
G?TZFRIED J , ECKERT M , SCHINZEL S ,et al. Cache attacks on Intel SGX[C]// Proceedings of the 10th European Workshop on Systems Security. 2017:2.
|
[13] |
MOGHIMI A , IRAZOQUI G , EISENBARTH T . Cachezoom:how SGX amplifies the power of cache attacks[C]// International Conference on Cryptographic Hardware and Embedded Systems. 2017: 69-90.
|
[14] |
SCHWARZ M , WEISER S , GRUSS D ,et al. Malware guard extens sion:using SGX to conceal cache attacks[C]// International Conference on Detection of Intrusions and Malware,and Vulnerability Assessment. 2017: 3-24.
|
[15] |
WANG W , CHEN G , PAN X ,et al. Leaky cauldron on the dark land:understanding memory side-channel hazards in SGX[C]// Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017: 2421-2434.
|
[16] |
STRACKX R , PIESSENS F . Ariadne:a minimal approach to state continuity[C]// 25th USENIX Security Symposium (USENIX Security 16). 2016: 875-892.
|
[17] |
CHEN S , ZHANG X , REITER M K ,et al. Detecting privileged side-channel attacks in shielded execution with Déjá Vu[C]// Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. 2017: 7-18.
|
[18] |
COSTAN V , LEBEDEV I , DEVADAS S . Sanctum:minimal hardware extensions for strong software isolation[C]// 25th USENIX Security Symposium (USENIX Security 16). 2016: 857-874.
|
[19] |
GRUSS D , LETTNER J , SCHUSTER F ,et al. Strong and efficient cache side-channel protection using hardware transactional memory[C]// 26th USENIX Security Symposium (USENIX Security 17). 2017: 217-233.
|
[20] |
SHIH M W , LEE S , KIM T ,et al. T-SGX:eradicating controlled-channel attacks against enclave programs[C]// NDSS. 2017.
|
[21] |
SHINDE S , CHUA Z L , NARAYANAN V ,et al. Preventing page faults from telling your secrets[C]// Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. 2016: 317-328.
|
[22] |
MISHRA P , PODDAR R , CHEN J ,et al. Oblix:an efficient oblivious search index[C]// 2018 IEEE Symposium on Security and Privacy (S&P). IEEE, 2018: 279-296.
|
[23] |
Crypto++[EB].
|