共 48 条
[1]
Abdmeziem M.R., 2014, INT C AD HOC NETW WI, P35
[2]
Agarwal N., 2021, Smart Innovations in Communication and Computational Sciences, V1168, P145
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Privacy Preserving String Matching for Cloud Computing
[J].
2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS,
2015,
:609-618
[5]
Secure Distribution of Protected Content in Information-Centric Networking
[J].
IEEE SYSTEMS JOURNAL,
2020, 14 (02)
:1921-1932
[6]
A secure key agreement protocol for dynamic group
[J].
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS,
2017, 20 (03)
:2779-2792
[8]
Blockchain, 2022, About us
[9]
Blockchain, 2021, Definition and use cases