共 107 条
[41]
Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
[J].
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:247-255
[43]
Inkyung Jeun, 2012, Advances in Grid and Pervasive Computing. Proceedings 7th International Conference, GPC 2012, P350, DOI 10.1007/978-3-642-30767-6_30
[44]
Kaitai Liang, 2014, Information Security Practice and Experience. 10th International Conference, ISPEC 2014. Proceedings: LNCS 8434, P448, DOI 10.1007/978-3-319-06320-1_33
[45]
Kaitai Liang, 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems, P552, DOI 10.1109/INCoS.2013.103
[46]
Kaitai Liang, 2013, Information Security Practice and Experience. 9th International Conference, ISPEC 2013. Proceedings, P132, DOI 10.1007/978-3-642-38033-4_10
[48]
Katz J., Tracing Insider Attacks in the Context of Predicate Encryption Schemes
[49]
Kawai Y., 2013, IACR CRYPTOLOGY EPRI, V2013, P318
[50]
Towards secure mobile cloud computing: A survey
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2013, 29 (05)
:1278-1299