共 41 条
[1]
Ateniese G, 2005, LECT NOTES COMPUT SC, V3352, P165
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures
[J].
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II,
2017, 10175
:152-182
[5]
Chen XF, 2004, LECT NOTES COMPUT SC, V3225, P87
[7]
iGeneration's social media usage in retrieving information related to healthcare education: a web-based survey among Italian and Romanian undergraduate medical students
[J].
ANNALI DELL ISTITUTO SUPERIORE DI SANITA,
2019, 55 (01)
:34-40
[8]
Costan Victor., Intel SGX explained
[10]
Engelhardt MA, 2017, TECHNOL INNOV MANAG, V7, P22, DOI 10.22215/timreview/1111