共 18 条
[1]
Agrawal S., LECT NOTES COMPUTER, V7293, P280
[2]
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
[3]
Attrapadung N, 2010, LECT NOTES COMPUT SC, V6056, P384
[5]
Chen C, 2011, LECT NOTES COMPUT SC, V6980, P84, DOI 10.1007/978-3-642-24316-5_8
[6]
Cheng Chen, 2012, Provable Security. Proceedings of the 6th International Conference (ProvSec 2012), P53, DOI 10.1007/978-3-642-33272-2_5
[7]
Emura Keita, 2012, International Journal of Applied Cryptography, V2, P199, DOI 10.1504/IJACT.2012.045589
[8]
Gagné M, 2010, LECT NOTES COMPUT SC, V6280, P154, DOI 10.1007/978-3-642-15317-4_11
[9]
Ge Aijun, 2012, Information Security and Privacy. Proceedings 17th Australasian Conference, ACISP 2012, P336, DOI 10.1007/978-3-642-31448-3_25
[10]
Goyal V., 2006, P 2006 INT C PRIVACY, P1