共 14 条
- [1] [Anonymous], 2005, NDSS 2005
- [2] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
- [3] Ateniese G., 2005, P 12 ACM C COMP COMM, P310, DOI DOI 10.1145/1102120.1102161
- [4] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
- [5] Emura K, 2010, LECT NOTES COMPUT SC, V6402, P200, DOI 10.1007/978-3-642-16280-0_14
- [6] LIBERT B, 2008, ACM C COMP COMM SEC, P511
- [7] Shao J, 2007, LECT NOTES COMPUT SC, V4859, P197
- [8] Shao J, 2010, LECT NOTES COMPUT SC, V6168, P216, DOI 10.1007/978-3-642-14081-5_14
- [10] Tang Q, 2009, LECT NOTES COMPUT SC, V5487, P332, DOI 10.1007/978-3-642-01440-6_26