共 15 条
[1]
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[3]
Boneh D., 2004, ACM T INTERNET TECHN, V4, P60
[4]
Camenisch J, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P131
[5]
Chow SSM, 2006, LECT NOTES COMPUT SC, V3958, P508
[6]
Cloud Computing: Issues and Challenges
[J].
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA),
2010,
:27-33
[7]
Jin Li, 2010, Proceedings of the 2010 IEEE 2nd International Conference on Cloud Computing Technology and Science (CloudCom 2010), P89, DOI 10.1109/CloudCom.2010.44
[8]
Katz J, 2008, LECT NOTES COMPUT SC, V4965, P146
[9]
Lei Xu X.W., 2012, ACM S INF COMP COMM
[10]
Lynn B., PAIRING BASED CRYPTO