共 52 条
[11]
Bonatti P. A., 2002, Journal of Computer Security, V10, P241
[12]
BONEH D, 2001, LNCS, V2139
[13]
BRADSHAW R, 2004, P 11 ACM C COMP COMM
[14]
Camenisch J, 2001, LECT NOTES COMPUT SC, V2045, P93
[15]
Camenisch J., 2002, Proceedings of the 9th ACM conference on Computer and communications security, P21, DOI 10.1145/586110.586114
[16]
Camp LJ, 2004, ADV INF SEC, V12, P17
[18]
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
[19]
CHEN W, 2005, P 24 ANN JOINT C IEE, V2, P1431
[20]
COCKS C, 2001, 8 IMA INT C CRYPT CO, V2260, P360