共 31 条
[1]
Abdmeziem M. R., 2014, INT C AD HOC NETWORK, P35
[2]
Bacis E., 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, P217
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Privacy Preserving String Matching for Cloud Computing
[J].
2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS,
2015,
:609-618
[6]
Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
[8]
Chen You, 2012, AMIA Annu Symp Proc, V2012, P93
[9]
A medical healthcare system for privacy protection based on IoT
[J].
2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP),
2015,
:217-222