共 15 条
[2]
[Anonymous], 2008, P 1 WORKSH ONL SOC N
[3]
Baden R, 2009, SIGCOMM 2009, P135
[4]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[5]
Buchegger Sonja., 2009, P 2 AC M EUROSYS WOR, P46, DOI DOI 10.1145/1578002.1578010
[6]
Cutillo LA, 2009, WONS 2009: SIXTH INTERNATIONAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES, P133
[7]
Graffi Kalman, 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC 2011), P554, DOI 10.1109/CCNC.2011.5766541
[8]
Jahid S., 2011, IEEE INT C PERV COMP, P326
[9]
Jang-Jaccard Julian, 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2013), P553, DOI 10.4108/icst.collaboratecom.2013.254212
[10]
Jinmiao W., 2017, 13 INT C COLL COMP N