共 20 条
[1]
Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
[2]
Chen Q. Q., 2023, Computer Engineering, V49, P161
[3]
Chintamani M., 2022, P 7 INT C MATH COMP, P1
[4]
Dongqing Yin, 2021, 2021 International Conference on Computer Information Science and Artificial Intelligence (CISAI), P1005, DOI 10.1109/CISAI54367.2021.00201
[5]
Faguo Wu, 2017, Security, Privacy, and Anonymity in Computation, Communication, and Storage. 10th International Conference, SpaCCS 2017. Proceedings: LNCS 10656, P321, DOI 10.1007/978-3-319-72389-1_26
[6]
Feng Yuan, 2016, J. Inf. Secur. Res., V2, P1008
[7]
He D. B., 2018, Patent, Patent No. [CN107579819A, 107579819]
[8]
Kumar M., 2019, P 15 INT C INF SEC C, P419
[9]
[赖建昌 Lai Jianchang], 2021, [中国科学. 信息科学, Scientia Sinica Informationis], V51, P1900
[10]
Li Xiaoyang, 2023, The Proceedings of the 17th Annual Conference of China Electrotechnical Society. Lecture Notes in Electrical Engineering (1013), P382, DOI 10.1007/978-981-99-0451-8_39