共 20 条
[1]
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[3]
Au M.H., 2007, P 2 ACM S INF COMP C, P302, DOI DOI 10.1145/1229285.1266997
[4]
Baek J, 2005, LECT NOTES COMPUT SC, V3650, P134
[5]
Cheng Z, 2005, 2005249 IACR CRYPT E
[7]
Dent AW, 2008, LECT NOTES COMPUT SC, V4939, P344, DOI 10.1007/978-3-540-78440-1_20
[8]
Guo H, 2009, NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, P302, DOI 10.1109/NSS.2009.31
[9]
Hu BC, 2006, LECT NOTES COMPUT SC, V4058, P235
[10]
Huang Q, 2007, LECT NOTES COMPUT SC, V4586, P215