共 28 条
[1]
Akshatha A, 2012, PROCEEDINGS OF 2012 IEEE INTERNATIONAL CONFERENCE ON CONDITION MONITORING AND DIAGNOSIS (IEEE CMD 2012), P336, DOI 10.1109/CMD.2012.6416447
[2]
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]
Barbosa M., 2008, P 2008 ACM S INF COM, P369, DOI DOI 10.1145/1368310.1368364
[4]
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[5]
Deyan Chen, 2012, Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE 2012), P647, DOI 10.1109/ICCSEE.2012.193
[6]
Green M, 2007, LECT NOTES COMPUT SC, V4521, P288
[7]
Identity-based data storage in cloud computing
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2013, 29 (03)
:673-681
[8]
PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 86
:1523-1533