共 44 条
[1]
[Anonymous], 2002, P 1 INT WORKSH PEER
[2]
[Anonymous], 2007, PBC LIB
[3]
[Anonymous], 2004, P ANN C USENIX ANN T
[4]
[Anonymous], P 2001 C APPL TECHN, DOI DOI 10.1145/383059.383071
[5]
BASET SA, 2006, P IEEE INFOCOM 06 AP
[6]
Bellare P., 1993, P 1 ACM C COMP COMM, P62, DOI DOI 10.1145/168588.168596
[7]
Hierarchical identity based encryption with constant size ciphertext
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:440-456
[9]
Computational puzzles as Sybil defenses
[J].
SIXTH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS,
2006,
:171-176
[10]
Canetti R., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P209, DOI 10.1145/276698.276741