共 11 条
[1]
Asokan N, 1998, LECT NOTES COMPUT SC, V1403, P591, DOI 10.1007/BFb0054156
[2]
Ateniese G., 2004, ACM Transactions on Information and Systems Security, V7, P1, DOI 10.1145/984334.984335
[3]
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[4]
Camenisch J, 2003, LECT NOTES COMPUT SC, V2729, P126
[5]
Cheng XG, 2005, LECT NOTES COMPUT SC, V3483, P1046
[6]
Gorantla MC, 2005, LECT NOTES COMPUT SC, V3816, P357
[7]
Gu CX, 2005, LECT NOTES COMPUT SC, V3822, P42
[8]
Huang ZJ, 2005, LECT NOTES COMPUT SC, V3810, P120
[9]
Kwon S, 2007, LECT NOTES COMPUT SC, V4464, P93
[10]
Zhang FG, 2003, LECT NOTES COMPUT SC, V2904, P191