共 47 条
[4]
Benabbas S, 2011, LECT NOTES COMPUT SC, V6841, P111, DOI 10.1007/978-3-642-22792-9_7
[5]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[6]
Blanchet Bruno., 2018, ProVerif 2.00: Automatic Cryptographic Protocol Verifier
[7]
Chai Q, 2012, IEEE ICC
[9]
Damgaard JB, 2002, PERFECT HIDING PERFE