共 40 条
[1]
Abadi M, 2013, LECT NOTES COMPUT SC, V8042, P374, DOI 10.1007/978-3-642-40041-4_21
[2]
[Anonymous], 2014, P 6 INT C NEW TECHNO
[3]
[Anonymous], 1973, Sorting and Searching
[4]
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[5]
Bellare Mihir, 2013, Proceedings of the 22nd USENIX Security Symposium. Security '13, P179
[6]
Message-Locked Encryption and Secure Deduplication
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013,
2013, 7881
:296-312
[7]
Bhaskar R., 2013, P 20 ANN NETW DISTR
[8]
Biggar H., 2007, EXPERIENCING DATA DE, DOI [10.1177/000944550704300309, DOI 10.1177/000944550704300309]
[9]
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[10]
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535