共 25 条
[1]
ANDERSON R, 1997, 4 ACM COMP COMM SEC
[2]
[Anonymous], 1997, TECHNICAL REPORT
[3]
[Anonymous], 1999, LNCS
[4]
[Anonymous], 2001, LECT NOTES COMPUTER
[5]
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[6]
Bowers Kevin D., 2014, Research in Attacks, Intrusions and Defenses. 17th International Symposium (RAID 2014). Proceedings: LNCS 8688, P46, DOI 10.1007/978-3-319-11379-1_3
[7]
Boyen X., 2006, P 13 ACM C COMP COMM, P191
[8]
Crosby S. A., 2009, USENIX SECURITY S, P317
[9]
Fault-Tolerant Aggregate Signatures
[J].
PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I,
2016, 9614
:331-356
[10]
Secure Audit Logs with Verifiable Excerpts
[J].
TOPICS IN CRYPTOLOGY - CT-RSA 2016,
2016, 9610
:183-199