共 28 条
[11]
Feng Deng-Guo, 2011, Journal of Software, V22, P71, DOI 10.3724/SP.J.1001.2011.03958
[12]
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[13]
Huang Ru-Wei, 2011, Chinese Journal of Computers, V34, P2391, DOI 10.3724/SP.J.1016.2011.02391
[15]
Depot: Cloud Storage with Minimal Trust
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2011, 29 (04)
[16]
Mao Jian, 2011, Journal of Tsinghua University (Science and Technology), V51, P1357
[17]
RISHI I., 2014, APPLE STRENGTHEN SEC
[18]
Fuzzy identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:457-473
[19]
Shamir A., 1984, ADV CRYPTOLOGY, P47, DOI 10.1007/3-540-39568-7_5
[20]
Shraer A, 2010, PROCEEDINGS OF THE 2010 ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'10:), P18