共 15 条
- [1] Bhartiya Shalini, ELSEVIER J COMPUTER
- [2] Ding MZ, 2012, PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2012), P526, DOI 10.1109/ICNIDC.2012.6418809
- [3] Echizenb Isao, 2010, ASPECTS PRIVACY ELEC
- [4] Gkoulalas Aris, 2014, J BIOMEDICAL INFORM
- [6] A New Public Key Encryption with Conjunctive Field Keyword Search Scheme [J]. INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (03): : 277 - 288
- [7] Ivy Joy G., 2013, IEEE C PUBLICATIONS
- [8] Mario Sicuranza Institute for High Performance Computing and Networking of the Italian National Research Council Angelo Esposito Institute for High Performance Computing and Networking of the Italian National Research Council, 2013, IEEE INT C INT TECHN
- [9] Nafiseh Kahani School of Computing Queen's University Canada Khalid Elgazzar School of Computer Science Carnegie Mellon University USA James R. Cordy School of Computing Queen's University Canada, 2016, AUTH ACC CONTR E HLT
- [10] Premarathne Uthpala, 2016, HYBRID CRYPTOGRAPHIC