共 51 条
[1]
[Anonymous], TECH REP
[2]
[Anonymous], 1996, SECURE SCHEMES SECRE
[3]
[Anonymous], P INT C S COMP COMM
[4]
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5921, P278, DOI 10.1007/978-3-642-10868-6_17
[5]
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
[6]
Temporal Access Control with User Revocation for Cloud Data
[J].
2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM),
2014,
:336-342
[7]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[8]
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[9]
Brown L, 2011, COLLOQUY, P34
[10]
Canetti R, 2003, LECT NOTES COMPUT SC, V2729, P565