共 24 条
[1]
ANZAI J, LECT NOTES COMP SCI, V1716, P333
[2]
BERKOVITS S, 1991, LECT NOTES COMPUT SC, V547, P535
[4]
Multicast security: A taxonomy and some efficient constructions
[J].
IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW,
1999,
:708-716
[5]
Canetti R, 1999, LECT NOTES COMPUT SC, V1592, P459
[7]
Cover T. M., 2005, ELEM INF THEORY, DOI 10.1002/047174882X
[8]
D'Arco P, 2003, LECT NOTES COMPUT SC, V2612, P263
[9]
Dwork C., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P489, DOI 10.1145/237814.237997