共 25 条
- [1] Rayes A., Salam S., Internet of things–from Hype to Reality, (2016)
- [2] Hu C.T., Ferraiolo D.F., Kuhn D.R.
- [3] Sahai A., Waters B., Fuzzy identity-based encryption, Lecture Notes in Computer Science, 3494, (2005)
- [4] Dong C., Russello G., Dulay N., Shared and searchable encrypted data for untrusted servers, Data and Applications Security XXII. Dbsec, (2008)
- [5] Attrapadung N., Imai H., Attribute-based encryption supporting direct/indirect revocation modes, Cryptography and Coding, (2009)
- [6] Liu J., Yuen T., Zhang P.
- [7] Zhang P., Chen Z., Liang K.
- [8] Ma H., Dong E., Liu Z.
- [9] Wang S., Yao L., Zhang Y., Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage, Plos ONE, 13, (2018)
- [10] Abodoma N., Mostafa A., Shaaban E., Adaptive time-bound key management scheme for the internet of things, IEEE 88Th Vehicular Technology Conference (Vtc-Fall), pp. 1-5, (2018)