共 39 条
[1]
Abidi A, 2014, 2014 GLOBAL SUMMIT ON COMPUTER & INFORMATION TECHNOLOGY (GSCIT)
[2]
Abram D, 2022, P IEEE S SECUR PRIV, P2554, DOI [10.1109/SP46214.2022.9833559, 10.1109/SP46214.2022.00128]
[3]
Alabbasi A., 2020, IEEE T SERV COMPUT, V15, P118
[4]
Aloqaily M, 2014, 2014 11TH ANNUAL HIGH CAPACITY OPTICAL NETWORKS AND EMERGING/ENABLING TECHNOLOGIES (PHOTONICS FOR ENERGY), P94, DOI 10.1109/HONET.2014.7029369
[5]
Beimel A., 1996, Secure schemes for secret sharing and key distribution
[6]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[7]
Boneh D, 2003, 2003 23 ANN INT CRYP
[8]
UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts
[J].
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2020,
:1769-1787
[10]
De Caro A, 2011, IEEE SYMP COMP COMMU