共 36 条
- [1] Abadi M, 2013, LECT NOTES COMPUT SC, V8042, P374, DOI 10.1007/978-3-642-40041-4_21
- [2] [Anonymous], 2014, PROC 6 USENIX WORKSH
- [3] [Anonymous], IDC iView: IDC Analyze the future
- [4] [Anonymous], 2012, IACR CRYPTOL EPRINT
- [5] Ateniese G., 2008, PROC 4 INT C SECUR P
- [6] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
- [7] Message-Locked Encryption and Secure Deduplication [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 296 - 312
- [8] Blasco J, 2014, IEEE CONF COMM NETW, P481, DOI 10.1109/CNS.2014.6997518
- [9] Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures [J]. PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 152 - 182
- [10] Chaum D., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P89