共 28 条
- [1] Akshatha A, 2012, PROCEEDINGS OF 2012 IEEE INTERNATIONAL CONFERENCE ON CONDITION MONITORING AND DIAGNOSIS (IEEE CMD 2012), P336, DOI 10.1109/CMD.2012.6416447
- [2] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
- [3] Barbosa M., 2008, P 2008 ACM S INF COM, P369, DOI DOI 10.1145/1368310.1368364
- [4] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
- [5] Deyan Chen, 2012, Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE 2012), P647, DOI 10.1109/ICCSEE.2012.193
- [6] Green M, 2007, LECT NOTES COMPUT SC, V4521, P288
- [7] Identity-based data storage in cloud computing [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (03): : 673 - 681
- [8] PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 : 1523 - 1533
- [10] Attacks on fast double block length hash functions [J]. JOURNAL OF CRYPTOLOGY, 1998, 11 (01) : 59 - 72