共 25 条
- [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
- [2] Al-Kadit I.A., 1992, Cryptologia, V16, P97, DOI DOI 10.1080/0161-119291866801
- [3] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
- [4] Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
- [5] Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
- [7] Fuhr T, 2007, LECT NOTES COMPUT SC, V4784, P228
- [8] Secure conjunctive keyword search over encrypted data [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 31 - 45