共 27 条
[1]
[Anonymous], BUSINESS INSIDER
[2]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]
Ateniese G, 2009, LECT NOTES COMPUT SC, V5912, P319, DOI 10.1007/978-3-642-10366-7_19
[5]
Benabbas S., 2011, CRYPTO, P110
[6]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[8]
Bowers KD, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P187
[9]
Bowers KevinD., 2009, Proc. of ACM-CCSW '09, P43, DOI DOI 10.1145/1655008.1655015
[10]
Chang EC, 2008, LECT NOTES COMPUT SC, V5283, P223