共 41 条
[1]
Au MH, 2008, LECT NOTES COMPUT SC, V5037, P94
[2]
Beimel A., 1996, 2004180 FAC COMP SCI
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[5]
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[7]
Gang Yu, 2017, Cyberspace Safety and Security. 9th International Symposium, CSS 2017. Proceedings: LNCS 10581, P337, DOI 10.1007/978-3-319-69471-9_25
[8]
Goyal V, 2007, LECT NOTES COMPUT SC, V4622, P430
[9]
Goyal V, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P427
[10]
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 78
:720-729