共 56 条
[1]
[Anonymous], P EL IND AUT C EIAC
[2]
[Anonymous], 1989, Conference on the Theory and Application of Cryptology, DOI DOI 10.1007/0-387-34805-0'22
[3]
Defending Against Load Monitoring in Smart Metering Data Through Noise Addition
[J].
30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II,
2015,
:2218-2224
[4]
Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
[6]
Short group signatures
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS,
2004, 3152
:41-55
[7]
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[8]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[9]
Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
[10]
Brickell E. F., 2004, P 11 ACM C COMP COMM, P132, DOI DOI 10.1109/TSC.2010.60