共 21 条
[11]
Goh Eu-Jin, 2003, IACR Cryptol. ePrint Arch.
[14]
Sedghi S, 2010, LECT NOTES COMPUT SC, V6280, P138, DOI 10.1007/978-3-642-15317-4_10
[15]
Song DXD, 2000, P IEEE S SECUR PRIV, P44, DOI 10.1109/SECPRI.2000.848445
[16]
Suga Takanori, 2012, Provable Security. Proceedings of the 6th International Conference (ProvSec 2012), P235, DOI 10.1007/978-3-642-33272-2_15
[17]
Wang B, 2014, IEEE INFOCOM SER, P2112, DOI 10.1109/INFOCOM.2014.6848153