共 42 条
[2]
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[4]
Ali M., 2018, IACR CRYPTOL EPRINT, V2018, P1102
[5]
[Anonymous], 2011, CANCER, DOI DOI 10.1186/1471-2407-11-309
[6]
Asharov Gilad, 2018, Proceedings on Privacy Enhancing Technologies, V2018, P104, DOI 10.1515/popets-2018-0034
[7]
Ateniese G, 2011, LECT NOTES COMPUT SC, V6571, P156, DOI 10.1007/978-3-642-19379-8_10
[8]
Baldi P, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P691
[9]
Belguith S., 2017, P 14 INT C SEC CRYPT, V6, P212
[10]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+