共 18 条
[1]
[Anonymous], 1993, CRYPTO, DOI DOI 10.1007/3-540-48329-2
[3]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]
Baden R., 2009, P ACM SIGCOMM 09 AUG
[5]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[6]
Goyal V., 2006, 13 ACM CONFCOMPUT CO, P89, DOI DOI 10.1145/1180405.1180418
[8]
Ibraimi L, 2009, LECT NOTES COMPUT SC, V5932, P309, DOI 10.1007/978-3-642-10838-9_23
[9]
Kallahalla M, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 2ND USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES (FAST'03), P29