共 34 条
[1]
[Anonymous], 1996, SECURE SCHEMES SECRE
[2]
[Anonymous], CCS07 P 14 ACM C
[3]
[Anonymous], 2011, PROCEEDING SEC 11 P
[4]
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
[5]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[6]
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[7]
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[8]
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[9]
Canetti R, 2003, LECT NOTES COMPUT SC, V2656, P255
[10]
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515