共 29 条
[1]
Abirami N., 2017, GLOBAL J PURE APPL M, V13, P3455
[2]
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[4]
Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185
[5]
Coron JS, 2000, LECT NOTES COMPUT SC, V1880, P229
[7]
Green M, 2007, LECT NOTES COMPUT SC, V4521, P288