共 28 条
[1]
Ambrosin M., 2016, IEEE MICRO
[2]
[Anonymous], 2016, P 8 ACM INT WORKSHOP, DOI DOI 10.1145/2944789.2949546
[3]
[Anonymous], 2002, P 9 ACM C COMP COMM
[4]
[Anonymous], 2016, OAUTH ABC ATTACK ALI
[5]
[Anonymous], 2017, Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016-2021 White Paper
[6]
[Anonymous], P 14 ACM C COMP COMM
[7]
[Anonymous], 2010, IEEE Standard for Information TechnologyLocal and Metropolitan Area NetworksSpecific RequirementsPart 11: Wireless LAN Medium Access Control (mac) and Physical Layer (PHY) Specifications Amendment 6: Wireless access in Vehicular Environments, DOI DOI 10.1109/IEEESTD.2010.5514475
[8]
Arana P., 2006, INFS, V612, P1
[9]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[10]
Boland H., 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513), P333, DOI 10.1109/CCECE.2004.1345023