共 12 条
[1]
Bowers KevinD., 2009, Proc. of ACM-CCSW '09, P43, DOI DOI 10.1145/1655008.1655015
[2]
Chaum D., 1991, Advances in Cryptology - EUROCRYPT '91. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P257
[4]
Govindaa K, 2012, IDENTITY ANONYMIZATI, DOI [10.1016/j.protcy.2012.05.079, DOI 10.1016/J.PROTCY.2012.05.079]
[5]
Gu Genqiang, 2012 IEEE INT C GRAN
[6]
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584
[7]
Kaliski Burt, MATH RSA PUBLIC KEY
[8]
Krawczyk Hugo, 2005, HMQV HIGH PERFORMANC, P1
[9]
Liu Wentao, CONS EL COMM NETW 20
[10]
Shacham H, 2008, LECT NOTES COMPUT SC, V5350, P90, DOI 10.1007/978-3-540-89255-7_7