共 16 条
[1]
CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
1983, 1 (03)
:239-248
[4]
Bradshaw R.W., 2004, P 11 ACM C COMP COMM, P146, DOI DOI 10.1145/1030083.1030104
[5]
Ellison C., 1999, RFC2693
[6]
GARLAN D., 2002, IEEE PERVAS COMPUT, V1, P2
[7]
Hierarchical ID-based cryptography
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS,
2002, 2501
:548-566
[8]
GROUP SAC, IBE SECURE EMAIL
[9]
Harn L., 1990, Computers & Security, V9, P539, DOI 10.1016/0167-4048(90)90132-D
[10]
HENGARTNER U, 2004, CMUCS04174