共 52 条
- [11] Bonatti P. A., 2002, Journal of Computer Security, V10, P241
- [12] BONEH D, 2001, LNCS, V2139
- [13] BRADSHAW R, 2004, P 11 ACM C COMP COMM
- [14] Camenisch J, 2001, LECT NOTES COMPUT SC, V2045, P93
- [15] Camenisch J., 2002, Proceedings of the 9th ACM conference on Computer and communications security, P21, DOI 10.1145/586110.586114
- [16] Camp LJ, 2004, ADV INF SEC, V12, P17
- [18] Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
- [19] CHEN W, 2005, P 24 ANN JOINT C IEE, V2, P1431
- [20] COCKS C, 2001, 8 IMA INT C CRYPT CO, V2260, P360