共 21 条
[1]
Bellare M., 1993, P 1 ACM C COMP COMM, P62
[2]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[3]
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[4]
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
[5]
Structured Encryption and Controlled Disclosure
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010,
2010, 6477
:577-594
[7]
Curtmola Reza, 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180417
[8]
Dietzfelbinger M., 2011, ABS11045111 ARXIV ABS11045111 ARXIV
[9]
Goh E.-J., 2003, 2003216 EPRINT 2003216 EPRINT
[10]
Software protection and simulation on oblivious RAMs
[J].
JOURNAL OF THE ACM,
1996, 43 (03)
:431-473