共 50 条
[1]
[Anonymous], 2005, P NETW DISTR SYST SE
[2]
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]
Au MH, 2006, LECT NOTES COMPUT SC, V4116, P111
[4]
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[5]
Two Secure Anonymous Proxy-based Data Storages
[J].
SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4,
2016,
:251-258
[6]
Boneh D, 2005, LECT NOTES COMPUT SC, V3376, P87
[7]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[9]
Hosting Services on an Untrusted Cloud
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II,
2015, 9057
:404-436
[10]
PICADOR: End-to-end encrypted Publish-Subscribe information distribution with proxy re-encryption
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2017, 71
:177-191