共 45 条
[3]
[Anonymous], The python pairing based cryptography library
[4]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[5]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[6]
Predictable Memory-CPU Co-Scheduling with Support for Latency-Sensitive Tasks
[J].
PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC),
2020,
[7]
Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 87
:712-724
[9]
Curtain RF, 2006, LECT NOTES CONTR INF, V329, P79, DOI 10.1007/11664550_5