共 33 条
- [1] ABOLFAZLI A, 2015, ENCY CLOUD COMPUT, P24
- [2] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
- [3] Barreto PSLM, 2006, LECT NOTES COMPUT SC, V3897, P319
- [4] Bethencourt J, 2006, Advanced Crypto Software Collection
- [5] Ciphertext-policy attribute-based encryption [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
- [6] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
- [7] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
- [8] Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
- [9] Chu CK, 2007, LECT NOTES COMPUT SC, V4779, P189
- [10] *CISC, 2016, CISC VIS NETW IND GL, P2016