共 50 条
- [41] Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks COMPUTER JOURNAL, 2015, 58 (10): : 2520 - 2536
- [45] Continuous Leakage-Amplified Public-Key Encryption With CCA Security COMPUTER JOURNAL, 2022, 65 (07): : 1760 - 1775
- [46] Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate COMPUTER JOURNAL, 2013, 56 (04): : 464 - 477
- [48] A Fast Public Key Searchable Encryption Scheme Against Inside Keyword Attacks COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, CHINESECSCW 2019, 2019, 1042 : 50 - 64
- [49] A Posteriori Openable Public Key Encryption ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 : 17 - 31