共 13 条
[1]
Arshad Junaid, 2009, Proceedings of the 2009 IEEE 15th International Conference on Parallel and Distributed Systems (ICPADS 2009), P479, DOI 10.1109/ICPADS.2009.46
[3]
Christodorescu Mihai., 2009, P 2009 ACM WORKSHOP, P97, DOI [DOI 10.1145/1655008.1655022, 10.1145/1655008.1655022]
[4]
Duan Q., 2012, Network and Service Management, IEEE Transactions on, V9, P373
[5]
Gennaro R, 2010, LECT NOTES COMPUT SC, V6223, P465, DOI 10.1007/978-3-642-14623-7_25
[6]
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[7]
Green M., 2011, P USENIX SEC S, P34
[9]
Marwaha1 Mohit, 2013, INT J COMPUTER SCI I, V10
[10]
Attribute-Based Encryption with Non-Monotonic Access Structures
[J].
CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2007,
:195-+