共 30 条
[2]
Ateniese G., 2008, IACR CRYPTOLOGY EPRI, P114
[3]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]
Ateniese G, 2009, LECT NOTES COMPUT SC, V5912, P319, DOI 10.1007/978-3-642-10366-7_19
[5]
Bairavasundaram LN, 2007, PERF E R SI, V35, P289
[6]
Deswarte Y, 2004, P 6 WORK C INT INT C
[7]
Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213
[8]
Filho D. L. G., 2006, Cryptol. ePrint Arch., V1, P150
[9]
Goodson GR, 2004, 2004 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, P135
[10]
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584