共 18 条
[1]
[Anonymous], 1985, P WORKSH THEOR APPL
[2]
Asim M., 2014, PROC 12 AUSTR INFORM, P21
[4]
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[5]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[6]
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[7]
Goyal V., 2006, P 2006 INT C PRIVACY, P1, DOI DOI 10.1145/1180405.1180418
[8]
Hu Peng, 2017, Wuhan University Journal of Natural Sciences, V22, P171, DOI 10.1007/s11859-017-1231-8
[10]
Liu XM, 2014, IEEE INT CONF COMM, P694, DOI 10.1109/ICCW.2014.6881280