共 46 条
[31]
Jawurek Marek, 2012, Privacy Enhancing Technologies. Proceedings 12th International Symposium, PETS 2012, P221, DOI 10.1007/978-3-642-31680-7_12
[32]
Jawurek M, 2011, LECT NOTES COMPUT SC, V6794, P192, DOI 10.1007/978-3-642-22263-4_11
[33]
Kursawe K, 2011, ICISR11002 RADB U NI
[34]
Kursawe K, 2011, LECT NOTES COMPUT SC, V6794, P175, DOI 10.1007/978-3-642-22263-4_10
[35]
McGregor A., 2011, ELECT C COMPUTATIONA, P106
[36]
McSherry F, 2009, ACM SIGMOD/PODS 2009 CONFERENCE, P19
[38]
Mironov I, 2009, LECT NOTES COMPUT SC, V5677, P126, DOI 10.1007/978-3-642-03356-8_8
[39]
Verification of Information Flow and Access Control Policies with Dependent Types
[J].
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011),
2011,
:165-179
[40]
Paillier P, 1999, LECT NOTES COMPUT SC, V1592, P223