共 27 条
[1]
Agrawal S, 2011, LECT NOTES COMPUT SC, V7073, P21, DOI 10.1007/978-3-642-25385-0_2
[2]
Agrawal S, 2012, LECT NOTES COMPUT SC, V7293, P280, DOI 10.1007/978-3-642-30057-8_17
[3]
Verified Computational Differential Privacy with Applications to Smart Metering
[J].
2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2013,
:287-301
[4]
Benaloh J., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P274
[6]
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[7]
Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16
[8]
Catalano D, 2013, LECT NOTES COMPUT SC, V7778, P55, DOI 10.1007/978-3-642-36362-7_5
[9]
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[10]
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121