共 17 条
[1]
[Anonymous], 2005, NDSS 2005
[2]
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[4]
Chiu YP, 2005, LECT NOTES COMPUT SC, V3783, P280
[7]
Ivan Anca., 2003, NDSS 2003
[8]
Kaitai Liang, 2013, Information Security Practice and Experience. 9th International Conference, ISPEC 2013. Proceedings, P132, DOI 10.1007/978-3-642-38033-4_10
[9]
Liang K, 2014, LECT NOTES COMPUT SC, V8712, P257, DOI 10.1007/978-3-319-11203-9_15