共 33 条
[1]
Agrawal S, 2011, LECT NOTES COMPUT SC, V7073, P21, DOI 10.1007/978-3-642-25385-0_2
[2]
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[5]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[7]
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[8]
Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16
[9]
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[10]
Cocks C.C., 2001, Lecture Notes in Computer Science, P360, DOI [DOI 10.1007/3-540-45325-3, DOI 10.1007/3-540-45325-332]