[1] |
张玉清, 王晓菲, 刘雪峰 ,等. 云计算环境安全综述[J]. 软件学报, 2016,27(6): 1328-1348.
|
|
ZHANG Y Q , WANG X F , LIU X F ,et al. Survey on cloud computing security[J]. Journal of Software, 2016,27(6): 1328-1348.
|
[2] |
苏铓, 史国振, 谢绒娜 ,等. 面向移动云计算的多要素代理重加密方案[J]. 通信学报, 2015,36(11): 73-79.
|
|
SU M , SHI G Z , XIE R N ,et al. Multi-element based on proxy re-encryption scheme for mobile cloud computing[J]. Journal on Communications, 2015,36(11): 73-79.
|
[3] |
SIDOROV E , Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library[J]. Lecture Notes in Computer Science, 2015,2664(4):956.
|
[4] |
BENGER N , SCOTT M . Constructing tower extensions for the implementation of pairing-based cryptography[C]// Springer Berlin Heidelberg. 2012: 180-195.
|
[5] |
LYNN B . On the implementation of pairing-based cryptosystems[J]. Dissertation Abstracts International, 2007,68: 3903-3910.
|
[6] |
ATENIESE G , FU K , GREEN M ,et al. Improved proxy re-encryption schemes with applications to secure distributed storage[J]. ACM Transactions on Information & System Security, 2006,9(1): 1-30.
|
[7] |
LEE P , MARK S , MATTHEWS J . A verifying core for a cryptographic language compiler[C]// International Workshop on the ACL2 Theorem Prover and ITS Applications. 2006: 1-10.
|
[8] |
LEVENT E , MATTHEWS J . High assurance programming in Cryptol[C]// The 5th Annual Workshop on Cyber Security and Information Intelligence Research. 2009: 60-61.
|
[9] |
AHMAD J J , LI S , SADEGHI A R ,et al. CTL:a platform independent crypto tools library based on dataflow programming paradigm[C]// International Conference on Financial Cryptography and Data Security. 2012: 299-313.
|
[10] |
TOMB A . Automated verification of real-world cryptographic implementations[J]. IEEE Security & Privacy, 2016,14(6): 26-33.
|
[11] |
李凤华, 阎军智, 谢绒娜 ,等. 面向分组密码算法的程序设计语言研究[J]. 电子学报, 2009,37(12): 2705-2710.
|
|
LI F H , YAN J Z , XIE R N ,et al. Research on the programming lan-guage for the block cipher algorithm[J]. Acta Electronica Sinica, 2009,37(12): 2705-2710.
|
[12] |
BOVET J , PARR T . ANTLRWorks:an ANTLR grammar development environment[J]. Software Practice & Experience, 2008,38(12): 1305-1332.
|
[13] |
SU M , LI F H , SHI G Z ,et al. A user-centric data secure creation scheme in cloud computing[J]. Chinese Journal of Electronics, 2016,25(CJE-4): 753-760.
|