共 42 条
[2]
Bamba B., 2008, Proceeding of 17th International Conference on World Wide Web, P237, DOI DOI 10.1145/1367497.1367531
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Catalano Dario., 2001, ACM C COMPUTER COMMU, P206
[5]
Chow Chi-Yin., 2006, P 14 ANN ACM INT S A, P171, DOI DOI 10.1145/1183471.1183500
[7]
Doroz Y., 2016, TECHNICAL REPORT
[8]
Poster: Privacy-Preserving Server-Driven Dynamic Spectrum Access System
[J].
MOBICOM '15: PROCEEDINGS OF THE 21ST ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING,
2015,
:218-220
[9]
FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I,
2015, 9056
:617-640
[10]
Duckham M, 2005, LECT NOTES COMPUT SC, V3468, P152