共 13 条
[1]
Alharbi K, 2012, INT CONF WIRE COMMUN
[2]
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[3]
Bao H., IEEE INTERN IN PRESS
[4]
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[5]
Chen L., PEER TO PEE IN PRESS
[6]
Erkin Zekeriya, 2012, Applied Cryptography and Network Security. Proceedings 10th International Conference, ACNS 2012, P561, DOI 10.1007/978-3-642-31284-7_33
[7]
Garcia FD, 2011, LECT NOTES COMPUT SC, V6710, P226, DOI 10.1007/978-3-642-22444-7_15
[8]
Li C., SECURITY CO IN PRESS
[9]
Liu Y, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P21