共 25 条
[1]
[Anonymous], IMPLEMENTING CRYPTOG
[2]
Birkett J, 2010, LECT NOTES COMPUT SC, V6168, P282, DOI 10.1007/978-3-642-14081-5_18
[3]
Blundo C, 2009, LECT NOTES COMPUT SC, V5888, P259, DOI 10.1007/978-3-642-10433-6_17
[4]
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[5]
Boyen X, 2006, LECT NOTES COMPUT SC, V4117, P290
[6]
The CloudGrid approach: Security analysis and performance evaluation
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2013, 29 (01)
:387-401
[7]
Chatterjee S., 2010388 IACR CRYPT E
[8]
Secure token passing at application level
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2010, 26 (07)
:1026-1031
[9]
Freeman DM, 2010, LECT NOTES COMPUT SC, V6110, P44
[10]
Iovino V, 2008, LECT NOTES COMPUT SC, V5209, P75, DOI 10.1007/978-3-540-85538-5_5