共 37 条
[1]
Benaloh J., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P274
[2]
Bessani A, 2011, EUROSYS 11: PROCEEDINGS OF THE EUROSYS 2011 CONFERENCE, P31
[3]
Blakley GR, 1984, LECT NOTES COMPUTER, P242, DOI DOI 10.1007/3-540-39568-7_20
[4]
Bowers KD, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P187
[5]
Dang Q. H., 2015, FEDERAL INF PROCESS, V180
[8]
I. CLEVERSAFE, 2010, COMM PORT
[10]
Jain P., 2011, Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT), P456, DOI 10.1109/WICT.2011.6141288