共 34 条
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Bigwood G., 2011, Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing (PASSAT/SocialCom 2011), P65, DOI 10.1109/PASSAT/SocialCom.2011.60
[5]
Boldrini Chiara, 2011, Performance Evaluation of Computer and Communication Systems. Milestones and Future Challenges. IFIP WG 6.3/7.3 International Workshop, PERFORM 2010 in Honor of Gunter Haring on the Occasion of His Emeritus Celebration. Revised Selected Papers, P141, DOI 10.1007/978-3-642-25575-5_12
[6]
Boneh D., 2004, ADV CRYPTOLOGY EUROC
[7]
Daly E, 2007, MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P32
[10]
Dora L., 2010, P 2 INT WORKSHOP MOB, P135