共 12 条
[1]
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[2]
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[3]
Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185
[4]
Chu CK, 2007, LECT NOTES COMPUT SC, V4779, P189
[6]
Green M, 2007, LECT NOTES COMPUT SC, V4521, P288
[8]
Li J., 2014, P 9 AS JOINT C INF S
[9]
Liang K., 2014, FUTURE GENERATION CO
[10]
Liang Xiaohui., 2009, ASIACCS 09, P276, DOI DOI 10.1145/1533057.1533094