共 27 条
[21]
TinyTate: computing the tate pairing in resource-constrained sensor nodes
[J].
SIXTH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS,
2007,
:318-323
[23]
Song DXD, 2000, P IEEE S SECUR PRIV, P44, DOI 10.1109/SECPRI.2000.848445
[24]
van Liesdonk P, 2010, LECT NOTES COMPUT SC, V6358, P87, DOI 10.1007/978-3-642-15546-8_7
[25]
Wang, 2012, Proc. 10th Intl Conf. Applied Cryptography and Network Security, P507, DOI DOI 10.1007/978-3-642-31284-7_30
[26]
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
[J].
2010 PROCEEDINGS IEEE INFOCOM,
2010,
[27]
Zhang JH, 2013, PROCEEDINGS OF THE 2013 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL AND INFORMATION PROCESSING (ICICIP), P257