共 26 条
[1]
[Anonymous], 1978, The Theory of Error-Correcting Codes
[3]
Ateniese G., 2005, Proc. ACM Conf. on Computer and Communication Security (ACM CCS 2005), P92, DOI DOI 10.1145/1102120.1102134.19
[4]
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[6]
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
[8]
Golle P, 2004, LECT NOTES COMPUT SC, V2964, P163
[9]
Jeedella JSY, 2012, IEEE MEDITERR ELECT, P375, DOI 10.1109/MELCON.2012.6196452
[10]
Juels A, 2003, LECT NOTES COMPUT SC, V2742, P103