共 26 条
[1]
Abdalla M, 2010, LECT NOTES COMPUT SC, V5978, P480, DOI 10.1007/978-3-642-11799-2_28
[2]
Ateniese G., 2005, IACR CRYPTOLOGY EPRI, V2005, P385
[3]
Barak B, 2005, LECT NOTES COMPUT SC, V3621, P361
[4]
Belenkiy M, 2009, LECT NOTES COMPUT SC, V5677, P108, DOI 10.1007/978-3-642-03356-8_7
[5]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[6]
Camenisch J, 2003, LECT NOTES COMPUT SC, V2729, P126
[7]
Camenisch J, 1997, LECT NOTES COMPUT SC, V1294, P410
[8]
(Un)linkable Pseudonyms for Governmental Databases
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1467-1479
[9]
Camenisch J, 2009, LECT NOTES COMPUT SC, V5479, P425, DOI 10.1007/978-3-642-01001-9_25
[10]
Canetti R., 2000, IACR Cryptology ePrint Archive, V2000, P67