共 11 条
- [1] [Anonymous], 2012, IEEE T INFORM FORENS
- [2] Ciphertext-policy attribute-based encryption [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
- [3] Identity-based encryption from the Weil pairing [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
- [4] Goyal V., 2006, ACM CCS 2006, P89, DOI DOI 10.1145/1180405.1180418
- [5] Mather T., CLOUD SECURITY PRIVA
- [6] Nirmala V., 2013, IJCA INT C COMM COMP
- [7] Attribute-Based Encryption with Non-Monotonic Access Structures [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 195 - +
- [8] Fuzzy identity-based encryption [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 457 - 473
- [9] Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
- [10] Zhu Y., 2012, CODASPY