共 32 条
[1]
Aggarwal C. C., 2008, ADV DATABASE SYSTEMS, V34, P612
[2]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[3]
Aumann Y, 2007, LECT NOTES COMPUT SC, V4392, P137
[4]
Baldi P, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P691
[5]
Baldwin R. W., 1985, Proceedings of the 1985 Symposium on Security and Privacy (Cat. No. 85CH2150-1), P92
[6]
Bellare M, 1993, P 1 ACM C COMP COMM, P62, DOI [DOI 10.1145/168588.168596, 10.1145/168588.168596]
[9]
De Cristofaro E, 2010, LECT NOTES COMPUT SC, V6052, P143, DOI 10.1007/978-3-642-14577-3_13
[10]
Freedman MJ, 2004, LECT NOTES COMPUT SC, V3027, P1