共 55 条
[1]
Al-Fedaghi S., 2012, Intelligent Information Management, V4, P123
[2]
[Anonymous], 2012, SECURITY 12
[3]
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[4]
Ateniese G, 2009, LECT NOTES COMPUT SC, V5473, P279, DOI 10.1007/978-3-642-00862-7_19
[5]
Baldi P, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P691
[7]
Barni M, 2009, LECT NOTES COMPUT SC, V5789, P424, DOI 10.1007/978-3-642-04444-1_26
[8]
Blake I.F., 2004, Advances in Cryptology (ASIACRYPT), volume 3329 of Lecture Notes in Computer Science (LNCS), V3329, P122
[9]
Blake IF, 2004, LECT NOTES COMPUT SC, V3329, P515
[10]
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122