共 17 条
[1]
[Anonymous], 2013, P INT WORKSH SEC CLO, DOI DOI 10.1145/2484402.2484408
[2]
Ateniese G, 2009, LECT NOTES COMPUT SC, V5912, P319, DOI 10.1007/978-3-642-10366-7_19
[3]
Barsoum A. F., 2012, Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2012), P829, DOI 10.1109/CCGrid.2012.55
[4]
Bo Chen, 2012, Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P515, DOI 10.1109/ICDCSW.2012.57
[5]
Etemad M., 2013, Proceedings of the 11th International Conference on Applied Cryptography and Network Security, P1
[6]
Ho T., 2003, SCI COMMONS
[7]
Hongwei Liu, 2013, Journal of Networks, V8, P373, DOI 10.4304/jnw.8.2.373-380
[8]
Jia X., 2012, 7 ACM S INF COMP COM
[9]
Liu FF, 2011, INT CONF CLOUD COMPU, P290, DOI 10.1109/CCIS.2011.6045077
[10]
Paillier P, 1999, LECT NOTES COMPUT SC, V1592, P223