共 33 条
[1]
Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
[2]
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]
Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment
[J].
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS,
2024, 27 (01)
:341-376
[4]
Searchable encryption on the cloud: a survey
[J].
JOURNAL OF SUPERCOMPUTING,
2022, 78 (07)
:9952-9984
[5]
Bhikshapathi Chenam Venkata, 2024, Peer-to-Peer Netw Appl
[6]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[7]
Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review
[J].
IEEE ACCESS,
2022, 10
:21584-21598