共 16 条
[2]
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[4]
Brown A, 2006, TOOLS PEER TO PEER N
[5]
Foster I., 2008, GRID COMPUTING ENV W, P1, DOI DOI 10.1109/GCE.2008.4738445
[6]
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[7]
Gummadi Krishna P., 2002, P SIGCOMMIMW 2002 MA
[8]
An improved pairing-free identity-based authenticated key agreement protocol based on ECC
[J].
INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY AND SYSTEM DESIGN 2011,
2012, 30
:499-507
[9]
Jae Hong Seo, 2013, Topics in Cryptology - CT-RSA 2013. The Cryptographers Track at the RSA Conference 2013. Proceedings, P343, DOI 10.1007/978-3-642-36095-4_22
[10]
Libert B, 2009, LECT NOTES COMPUT SC, V5473, P1, DOI 10.1007/978-3-642-00862-7_1