共 19 条
[1]
Adya A, 2002, USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P1
[2]
[Anonymous], 2003, CRYPTOLOGY EPRINT AR
[3]
Benaloh Josh., 2009, P 2009 ACM WORKSHOP, P103, DOI DOI 10.1145/1655008.1655024
[4]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[5]
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[6]
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
[7]
Curtmola Reza, 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180417
[8]
Hacigumus H., 2002, P 2002 ACM SIGMOD IN, P216, DOI DOI 10.1145/564691.564717
[9]
Kamara S, 2010, LECT NOTES COMPUT SC, V6054, P136, DOI 10.1007/978-3-642-14992-4_13
[10]
Kubiatowicz J, 2000, ACM SIGPLAN NOTICES, V35, P190, DOI 10.1145/384264.379239