共 30 条
- [2] Ateniese G., 2008, IACR CRYPTOLOGY EPRI, P114
- [3] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
- [4] Ateniese G, 2009, LECT NOTES COMPUT SC, V5912, P319, DOI 10.1007/978-3-642-10366-7_19
- [5] Bairavasundaram LN, 2007, PERF E R SI, V35, P289
- [6] Deswarte Y, 2004, P 6 WORK C INT INT C
- [7] Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213
- [8] Filho D. L. G., 2006, Cryptol. ePrint Arch., V1, P150
- [9] Goodson GR, 2004, 2004 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, P135
- [10] Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584