共 24 条
[1]
[Anonymous], 2001, ANN INT CRYPTOLOGY C
[2]
[Anonymous], 2003, NDSS
[3]
Beimel A., 1996, Secure schemes for secret sharing and key distribution
[4]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[5]
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[6]
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[7]
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[8]
Damiani E., 2005, P ACM WORKSHOP STORA, P74
[9]
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[10]
Goyal V, 2008, LECT NOTES COMPUT SC, V5126, P579, DOI 10.1007/978-3-540-70583-3_47