共 48 条
- [11] Dorri Ali, 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P618, DOI 10.1109/PERCOMW.2017.7917634
- [12] Hierarchical Attribute-Based Signatures [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2018, 2018, 11124 : 213 - 234
- [14] Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
- [15] Gagne Martin, 2012, Pairing-Based Cryptography - Pairing 2012. 5th International Conference. Revised Selected Papers, P295, DOI 10.1007/978-3-642-36334-4_19
- [16] Gaurkar S, 2013, INT J SCI TECHNOL RE, V16, P63
- [17] Gong L., 1989, Proceedings 1989 IEEE Symposium on Security and Privacy (Cat. No.89CH2703-7), P56, DOI 10.1109/SECPRI.1989.36277
- [18] Towards Activity-Centric Access Control for Smart Collaborative Ecosystems [J]. PROCEEDINGS OF THE 26TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2021, 2021, : 155 - 164
- [20] Gyu Myoung Lee, 2010, 2010 International Conference on Information and Communication Technology Convergence (ICTC), P517, DOI 10.1109/ICTC.2010.5674788