共 22 条
[1]
[Anonymous], 2007, AINA 2007
[2]
Bar-Ilan J., 1989, Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing, P201, DOI 10.1145/72981.72995
[3]
Bunn P, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P486
[4]
Cramer R, 2001, LECT NOTES COMPUT SC, V2045, P280
[5]
Du WL, 2001, 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, P102, DOI 10.1109/ACSAC.2001.991526
[6]
Emura K, 2010, LECT NOTES ARTIF INT, V6440, P370, DOI 10.1007/978-3-642-17316-5_36
[8]
Jagannathan G., 2005, Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, P593, DOI DOI 10.1145/1081870.1081942
[9]
Jagannathan G., 2006, SDM
[10]
Jha S, 2005, LECT NOTES COMPUT SC, V3679, P397