共 10 条
[2]
Camenisch J, 2000, LECT NOTES COMPUT SC, V1976, P415
[3]
Choi JG, 2003, 37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, P587
[4]
Herranz J, 2003, LECT NOTES COMPUT SC, V2904, P266
[5]
Ju HS, 2002, LECT NOTES COMPUT SC, V2587, P421
[6]
NARO M, 1990, LECT NOTES COMPUTER, V435, P128
[7]
Pfitzmann B., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P88
[8]
PFIZMANN B, 2000, LECT NOTES COMPUTER, V1976, P401
[9]
Rivest R. L., 2001, LNCS, P552, DOI DOI 10.1007/3-540-45682-1_32
[10]
Wang Y, 2003, LECT NOTES COMPUT SC, V2836, P260