共 30 条
[1]
Alqahtani HS, 2014, INT CONF UTIL CLOUD, P495, DOI 10.1109/UCC.2014.68
[2]
[Anonymous], 2016, ETSI GS MEC 003
[3]
Ateniese G., 2005, P 12 ACM C COMP COMM, P310
[4]
A Light-Weight Permutation based Method for Data Privacy in Mobile Cloud Computing
[J].
2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015),
2015,
:189-196
[5]
Bellare M, 2002, LECT NOTES COMPUT SC, V2442, P162
[6]
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[8]
Identity-based signature scheme based on quadratic residues
[J].
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES,
2007, 50 (03)
:373-380
[9]
Farash M. S., 2017, INT J COMMUN SYST, V28, P1243
[10]
Feng Jie, 2014, Journal of Computer Applications, V34, P3291, DOI 10.11772/j.issn.1001-9081.2014.11.3291