共 39 条
[1]
[Anonymous], 2014, Cryptography and Security Systems
[2]
Ao L., 2016, ZTE Commun, V14, P21
[3]
Baugher M., 2005, 4046 RFC
[4]
Challal Yacine, 2018, 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), P187, DOI 10.1109/WETICE.2018.00043
[7]
Gervais A., 2016, P 2016 ACM SIGSAC C, P3, DOI [DOI 10.1145/2976749, 10.1145/2976749.2978341, DOI 10.1145/2976749.2978341]
[8]
Gharout S., 2008, International Journal of Network Security, V7, P142
[9]
An efficient key management scheme for user access control in outsourced databases
[J].
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS,
2017, 20 (03)
:467-490
[10]
KeyChain: Blockchain-based Key Distribution
[J].
2018 4TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2018),
2018,
:126-131