![]() |
35. L. Xu, C. Jiang, J. Wang, J. Yuan, and Y. Ren, "Information Security in Big Data: Privacy and Data Mining," IEEE Access, vol.2, pp.1149-1176, Oct. 2014.
点击次数:
是否译文:否
上一条:34. J. Wang, J. Mu, S. Wei, C. Jiang, and N. Beaulieu, "Statistical Characterization of Decryption Errors in Block-Ciphered Systems," IEEE Transactions on Communications, vol. 63, no. 11, pp. 4363-4376, Nov. 2015.
下一条:36. S. Wei, J. Wang, R. Yin, and J. Yuan, "Trade-Off Between Security and Performance in Block Ciphered Systems With Erroneous Ciphertexts," IEEE Transactions on Information Forensics and Security, vol.8, no.4, pp.636-645, Apr. 2013.