共 54 条
- [2] [Anonymous], 1996, SECURE SCHEMES SECRE
- [3] Attrapadung N, 2009, LECT NOTES COMPUT SC, V5921, P278, DOI 10.1007/978-3-642-10868-6_17
- [4] Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
- [5] Bellare M., 1993, LNCS, V740, P390, DOI [10.1007/3-540-48071-428, DOI 10.1007/3-540-48071-428]
- [6] Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
- [7] Integration of Cloud computing and Internet of Things: A survey [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 : 684 - 700
- [8] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
- [9] Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
- [10] Chen N., 2020, IEEE T COMPUT, DOI [10.1109/TC.2020.3043950, DOI 10.1109/TC.2020.3043950]