共 24 条
[1]
Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2014, 35
:80-90
[2]
[Anonymous], 1993, CRYPTO, DOI DOI 10.1007/3-540-48329-2
[3]
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
[5]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[6]
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[7]
Chen C, 2011, LECT NOTES COMPUT SC, V6980, P84, DOI 10.1007/978-3-642-24316-5_8
[8]
Dlodlo N., 2012, International Proceedings of Chemical, Biological and Environmental Engineering (IPCBEE), V32, P45
[9]
Gayoso V., 2010, J. Comput. Sci. Eng, V2, P7
[10]
Goyal V., 2006, P 2006 INT C PRIVACY, P1