共 47 条
[1]
A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
[J].
IEEE SYSTEMS JOURNAL,
2022, 16 (01)
:1685-1696
[2]
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]
Barker E., 2007, RECOMMENDATION KEY M, P1
[4]
Barker W.C., 2012, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher: NIST Special Publication 800-67, Revision 2
[5]
Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
[6]
Bellare M, 2014, LECT NOTES COMPUT SC, V8616, P1, DOI 10.1007/978-3-662-44371-2_1
[7]
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[9]
Anonymous Attestation with Subverted TPMs
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III,
2017, 10403
:427-461
[10]
Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185